Analysis

  • max time kernel
    898s
  • max time network
    900s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2025, 18:11

General

  • Target

    15415145.exe

  • Size

    59KB

  • MD5

    6c091ad6fae0fa76f44870d1a1b05cb4

  • SHA1

    040f60c0ee3f4902f919025057e34ab4d11b1abd

  • SHA256

    c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

  • SHA512

    3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

  • SSDEEP

    1536:skyZtyUQ8sBkROLW+UzbTH3gfm2qt0OgSko7:skItfQ8sBkROUzbTQf+6OgK7

Malware Config

Extracted

Family

xworm

Version

3.1

C2

known-savage.gl.at.ply.gg:45116

association-lectures.gl.at.ply.gg:32463

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain
aes.plain

Signatures

  • Detect Xworm Payload 24 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 11 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 22 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\15415145.exe
    "C:\Users\Admin\AppData\Local\Temp\15415145.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1876
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "15415145" /tr "C:\Users\Admin\AppData\Roaming\15415145.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:924
    • C:\Users\Admin\AppData\Local\Temp\gscpca.exe
      "C:\Users\Admin\AppData\Local\Temp\gscpca.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:512
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\gscpca.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3232
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'gscpca.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2944
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\gscpca.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3276
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "gscpca" /tr "C:\Users\Admin\AppData\Roaming\gscpca.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4952
    • C:\Users\Admin\AppData\Local\Temp\vrqiko.exe
      "C:\Users\Admin\AppData\Local\Temp\vrqiko.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:220
    • C:\Users\Admin\AppData\Local\Temp\gsfkby.exe
      "C:\Users\Admin\AppData\Local\Temp\gsfkby.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2024
    • C:\Users\Admin\AppData\Local\Temp\gjovrn.exe
      "C:\Users\Admin\AppData\Local\Temp\gjovrn.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "gjovrn" /tr "C:\Users\Admin\AppData\Roaming\gjovrn.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4920
      • C:\Users\Admin\AppData\Local\Temp\flyabc.exe
        "C:\Users\Admin\AppData\Local\Temp\flyabc.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1632
      • C:\Users\Admin\AppData\Local\Temp\fzacwg.exe
        "C:\Users\Admin\AppData\Local\Temp\fzacwg.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:264
      • C:\Users\Admin\AppData\Local\Temp\zpfqpb.exe
        "C:\Users\Admin\AppData\Local\Temp\zpfqpb.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3332
      • C:\Users\Admin\AppData\Local\Temp\efvfvi.exe
        "C:\Users\Admin\AppData\Local\Temp\efvfvi.exe"
        3⤵
        • Checks computer location settings
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4928
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "efvfvi" /tr "C:\Users\Admin\AppData\Roaming\efvfvi.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:4216
        • C:\Users\Admin\AppData\Local\Temp\oezjlq.exe
          "C:\Users\Admin\AppData\Local\Temp\oezjlq.exe"
          4⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4988
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "oezjlq" /tr "C:\Users\Admin\AppData\Roaming\oezjlq.exe"
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:4344
          • C:\Users\Admin\AppData\Local\Temp\cpkupp.exe
            "C:\Users\Admin\AppData\Local\Temp\cpkupp.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3864
          • C:\Users\Admin\AppData\Local\Temp\nelhbc.exe
            "C:\Users\Admin\AppData\Local\Temp\nelhbc.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3912
          • C:\Users\Admin\AppData\Local\Temp\kbbchy.exe
            "C:\Users\Admin\AppData\Local\Temp\kbbchy.exe"
            5⤵
            • Executes dropped EXE
            PID:64
          • C:\Users\Admin\AppData\Local\Temp\tnojiw.exe
            "C:\Users\Admin\AppData\Local\Temp\tnojiw.exe"
            5⤵
              PID:1916
            • C:\Users\Admin\AppData\Local\Temp\oooxdt.exe
              "C:\Users\Admin\AppData\Local\Temp\oooxdt.exe"
              5⤵
                PID:4320
              • C:\Users\Admin\AppData\Local\Temp\hddfoh.exe
                "C:\Users\Admin\AppData\Local\Temp\hddfoh.exe"
                5⤵
                  PID:1240
                • C:\Users\Admin\AppData\Local\Temp\sszirs.exe
                  "C:\Users\Admin\AppData\Local\Temp\sszirs.exe"
                  5⤵
                    PID:4716
                  • C:\Users\Admin\AppData\Local\Temp\ofxerh.exe
                    "C:\Users\Admin\AppData\Local\Temp\ofxerh.exe"
                    5⤵
                      PID:3944
                    • C:\Users\Admin\AppData\Local\Temp\hpbdes.exe
                      "C:\Users\Admin\AppData\Local\Temp\hpbdes.exe"
                      5⤵
                        PID:2000
                      • C:\Users\Admin\AppData\Local\Temp\fshogb.exe
                        "C:\Users\Admin\AppData\Local\Temp\fshogb.exe"
                        5⤵
                          PID:812
                        • C:\Users\Admin\AppData\Local\Temp\bparzy.exe
                          "C:\Users\Admin\AppData\Local\Temp\bparzy.exe"
                          5⤵
                            PID:676
                          • C:\Users\Admin\AppData\Local\Temp\zfmtjo.exe
                            "C:\Users\Admin\AppData\Local\Temp\zfmtjo.exe"
                            5⤵
                              PID:5024
                            • C:\Users\Admin\AppData\Local\Temp\zkvwvc.exe
                              "C:\Users\Admin\AppData\Local\Temp\zkvwvc.exe"
                              5⤵
                                PID:3408
                              • C:\Users\Admin\AppData\Local\Temp\yjwhpn.exe
                                "C:\Users\Admin\AppData\Local\Temp\yjwhpn.exe"
                                5⤵
                                  PID:3100
                                • C:\Users\Admin\AppData\Local\Temp\seylav.exe
                                  "C:\Users\Admin\AppData\Local\Temp\seylav.exe"
                                  5⤵
                                    PID:2152
                                  • C:\Users\Admin\AppData\Local\Temp\aemyhb.exe
                                    "C:\Users\Admin\AppData\Local\Temp\aemyhb.exe"
                                    5⤵
                                      PID:3248
                                    • C:\Users\Admin\AppData\Local\Temp\rwfyfm.exe
                                      "C:\Users\Admin\AppData\Local\Temp\rwfyfm.exe"
                                      5⤵
                                        PID:4324
                                      • C:\Users\Admin\AppData\Local\Temp\ungmdt.exe
                                        "C:\Users\Admin\AppData\Local\Temp\ungmdt.exe"
                                        5⤵
                                          PID:4192
                                        • C:\Users\Admin\AppData\Local\Temp\wixfpw.exe
                                          "C:\Users\Admin\AppData\Local\Temp\wixfpw.exe"
                                          5⤵
                                            PID:4056
                                          • C:\Users\Admin\AppData\Local\Temp\euamzu.exe
                                            "C:\Users\Admin\AppData\Local\Temp\euamzu.exe"
                                            5⤵
                                              PID:5104
                                            • C:\Users\Admin\AppData\Local\Temp\zoertf.exe
                                              "C:\Users\Admin\AppData\Local\Temp\zoertf.exe"
                                              5⤵
                                                PID:388
                                              • C:\Users\Admin\AppData\Local\Temp\cbdtfz.exe
                                                "C:\Users\Admin\AppData\Local\Temp\cbdtfz.exe"
                                                5⤵
                                                  PID:5032
                                                • C:\Users\Admin\AppData\Local\Temp\wadkmb.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\wadkmb.exe"
                                                  5⤵
                                                    PID:3844
                                                  • C:\Users\Admin\AppData\Local\Temp\gfbeos.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\gfbeos.exe"
                                                    5⤵
                                                      PID:3172
                                                    • C:\Users\Admin\AppData\Local\Temp\yuoptn.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\yuoptn.exe"
                                                      5⤵
                                                        PID:2020
                                                      • C:\Users\Admin\AppData\Local\Temp\bexkyq.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\bexkyq.exe"
                                                        5⤵
                                                          PID:4316
                                                      • C:\Users\Admin\AppData\Local\Temp\lroqog.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\lroqog.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3256
                                                      • C:\Users\Admin\AppData\Local\Temp\tovfno.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\tovfno.exe"
                                                        4⤵
                                                        • Checks computer location settings
                                                        • Drops startup file
                                                        • Executes dropped EXE
                                                        • Adds Run key to start application
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:264
                                                        • C:\Windows\System32\schtasks.exe
                                                          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "tovfno" /tr "C:\Users\Admin\AppData\Roaming\tovfno.exe"
                                                          5⤵
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:3980
                                                        • C:\Users\Admin\AppData\Local\Temp\qeydpi.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\qeydpi.exe"
                                                          5⤵
                                                          • Executes dropped EXE
                                                          PID:2896
                                                        • C:\Users\Admin\AppData\Local\Temp\kdkegv.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\kdkegv.exe"
                                                          5⤵
                                                          • Executes dropped EXE
                                                          PID:4036
                                                        • C:\Users\Admin\AppData\Local\Temp\xohued.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\xohued.exe"
                                                          5⤵
                                                            PID:4740
                                                          • C:\Users\Admin\AppData\Local\Temp\uukeii.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\uukeii.exe"
                                                            5⤵
                                                            • Checks computer location settings
                                                            • Drops startup file
                                                            • Adds Run key to start application
                                                            PID:3952
                                                            • C:\Windows\System32\schtasks.exe
                                                              "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "uukeii" /tr "C:\Users\Admin\AppData\Roaming\uukeii.exe"
                                                              6⤵
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:2876
                                                            • C:\Users\Admin\AppData\Local\Temp\omjgpw.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\omjgpw.exe"
                                                              6⤵
                                                                PID:2396
                                                              • C:\Users\Admin\AppData\Local\Temp\yulcvb.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\yulcvb.exe"
                                                                6⤵
                                                                  PID:3296
                                                                • C:\Users\Admin\AppData\Local\Temp\bfrnfu.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\bfrnfu.exe"
                                                                  6⤵
                                                                    PID:1308
                                                                  • C:\Users\Admin\AppData\Local\Temp\mvqxjn.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\mvqxjn.exe"
                                                                    6⤵
                                                                      PID:4620
                                                                    • C:\Users\Admin\AppData\Local\Temp\yqghsh.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\yqghsh.exe"
                                                                      6⤵
                                                                        PID:4788
                                                                      • C:\Users\Admin\AppData\Local\Temp\eeoqvh.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\eeoqvh.exe"
                                                                        6⤵
                                                                          PID:1284
                                                                        • C:\Users\Admin\AppData\Local\Temp\detpgp.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\detpgp.exe"
                                                                          6⤵
                                                                            PID:1384
                                                                          • C:\Users\Admin\AppData\Local\Temp\bqfwuo.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\bqfwuo.exe"
                                                                            6⤵
                                                                              PID:1632
                                                                            • C:\Users\Admin\AppData\Local\Temp\dcktdp.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\dcktdp.exe"
                                                                              6⤵
                                                                                PID:2536
                                                                              • C:\Users\Admin\AppData\Local\Temp\srdwhz.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\srdwhz.exe"
                                                                                6⤵
                                                                                  PID:2456
                                                                                • C:\Users\Admin\AppData\Local\Temp\prbexq.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\prbexq.exe"
                                                                                  6⤵
                                                                                    PID:4456
                                                                                  • C:\Users\Admin\AppData\Local\Temp\mkjkka.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\mkjkka.exe"
                                                                                    6⤵
                                                                                      PID:3608
                                                                                    • C:\Users\Admin\AppData\Local\Temp\axpaws.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\axpaws.exe"
                                                                                      6⤵
                                                                                        PID:3328
                                                                                      • C:\Users\Admin\AppData\Local\Temp\hcvsdq.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\hcvsdq.exe"
                                                                                        6⤵
                                                                                          PID:3528
                                                                                        • C:\Users\Admin\AppData\Local\Temp\wlbzye.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\wlbzye.exe"
                                                                                          6⤵
                                                                                            PID:3332
                                                                                          • C:\Users\Admin\AppData\Local\Temp\ehwuzo.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\ehwuzo.exe"
                                                                                            6⤵
                                                                                              PID:4020
                                                                                            • C:\Users\Admin\AppData\Local\Temp\owspjk.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\owspjk.exe"
                                                                                              6⤵
                                                                                                PID:1556
                                                                                              • C:\Users\Admin\AppData\Local\Temp\ftrjsf.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\ftrjsf.exe"
                                                                                                6⤵
                                                                                                  PID:4268
                                                                                              • C:\Users\Admin\AppData\Local\Temp\wpwnxc.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\wpwnxc.exe"
                                                                                                5⤵
                                                                                                  PID:1244
                                                                                                • C:\Users\Admin\AppData\Local\Temp\pdcfgx.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\pdcfgx.exe"
                                                                                                  5⤵
                                                                                                    PID:888
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tnapnb.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\tnapnb.exe"
                                                                                                    5⤵
                                                                                                      PID:4200
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\zvdcwf.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\zvdcwf.exe"
                                                                                                      5⤵
                                                                                                        PID:2932
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\gpbwmr.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\gpbwmr.exe"
                                                                                                        5⤵
                                                                                                          PID:3160
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\lmwqga.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\lmwqga.exe"
                                                                                                          5⤵
                                                                                                            PID:628
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\lwghpc.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\lwghpc.exe"
                                                                                                            5⤵
                                                                                                              PID:3680
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ssikbq.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\ssikbq.exe"
                                                                                                              5⤵
                                                                                                                PID:3228
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\degiem.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\degiem.exe"
                                                                                                                5⤵
                                                                                                                • Checks computer location settings
                                                                                                                • Drops startup file
                                                                                                                • Adds Run key to start application
                                                                                                                PID:5108
                                                                                                                • C:\Windows\System32\schtasks.exe
                                                                                                                  "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "degiem" /tr "C:\Users\Admin\AppData\Roaming\degiem.exe"
                                                                                                                  6⤵
                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                  PID:4604
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\vnsxyq.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\vnsxyq.exe"
                                                                                                                  6⤵
                                                                                                                  • Checks computer location settings
                                                                                                                  • Drops startup file
                                                                                                                  • Adds Run key to start application
                                                                                                                  PID:4108
                                                                                                                  • C:\Windows\System32\schtasks.exe
                                                                                                                    "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "vnsxyq" /tr "C:\Users\Admin\AppData\Roaming\vnsxyq.exe"
                                                                                                                    7⤵
                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                    PID:2564
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ejjkhu.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\ejjkhu.exe"
                                                                                                                    7⤵
                                                                                                                      PID:2816
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\jlxqgk.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\jlxqgk.exe"
                                                                                                                      7⤵
                                                                                                                        PID:1492
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\owlawh.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\owlawh.exe"
                                                                                                                        7⤵
                                                                                                                          PID:1360
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\nbjzna.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\nbjzna.exe"
                                                                                                                          7⤵
                                                                                                                            PID:1952
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\gghblm.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\gghblm.exe"
                                                                                                                            7⤵
                                                                                                                              PID:1368
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\hlswrj.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\hlswrj.exe"
                                                                                                                              7⤵
                                                                                                                                PID:1244
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\vaoxcc.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\vaoxcc.exe"
                                                                                                                              6⤵
                                                                                                                                PID:3584
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\krktmk.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\krktmk.exe"
                                                                                                                                6⤵
                                                                                                                                  PID:3504
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\bivoin.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\bivoin.exe"
                                                                                                                                  6⤵
                                                                                                                                  • Checks computer location settings
                                                                                                                                  • Drops startup file
                                                                                                                                  • Adds Run key to start application
                                                                                                                                  PID:2632
                                                                                                                                  • C:\Windows\System32\schtasks.exe
                                                                                                                                    "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "bivoin" /tr "C:\Users\Admin\AppData\Roaming\bivoin.exe"
                                                                                                                                    7⤵
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:4764
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\bfjrbn.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\bfjrbn.exe"
                                                                                                                                    7⤵
                                                                                                                                      PID:2932
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\rasald.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\rasald.exe"
                                                                                                                                      7⤵
                                                                                                                                        PID:1308
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\fndrco.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\fndrco.exe"
                                                                                                                                        7⤵
                                                                                                                                          PID:1640
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\nadevi.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\nadevi.exe"
                                                                                                                                          7⤵
                                                                                                                                            PID:1916
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\acceru.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\acceru.exe"
                                                                                                                                          6⤵
                                                                                                                                            PID:1044
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\fmughc.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\fmughc.exe"
                                                                                                                                            6⤵
                                                                                                                                              PID:4760
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\hicoqa.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\hicoqa.exe"
                                                                                                                                              6⤵
                                                                                                                                                PID:1100
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\zerzpg.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\zerzpg.exe"
                                                                                                                                                6⤵
                                                                                                                                                  PID:444
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\jwlifm.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\jwlifm.exe"
                                                                                                                                                  6⤵
                                                                                                                                                    PID:1808
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\futqhh.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\futqhh.exe"
                                                                                                                                                  5⤵
                                                                                                                                                    PID:4108
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\asrltu.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\asrltu.exe"
                                                                                                                                                    5⤵
                                                                                                                                                      PID:1720
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\adgadr.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\adgadr.exe"
                                                                                                                                                      5⤵
                                                                                                                                                        PID:1820
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\usgajd.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\usgajd.exe"
                                                                                                                                                        5⤵
                                                                                                                                                          PID:3520
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\xwolth.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\xwolth.exe"
                                                                                                                                                          5⤵
                                                                                                                                                            PID:1188
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\kdhkkm.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\kdhkkm.exe"
                                                                                                                                                            5⤵
                                                                                                                                                              PID:3176
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\gvozgw.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\gvozgw.exe"
                                                                                                                                                              5⤵
                                                                                                                                                                PID:4944
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\lhzojx.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\lhzojx.exe"
                                                                                                                                                                5⤵
                                                                                                                                                                • Checks computer location settings
                                                                                                                                                                • Drops startup file
                                                                                                                                                                • Adds Run key to start application
                                                                                                                                                                PID:1936
                                                                                                                                                                • C:\Windows\System32\schtasks.exe
                                                                                                                                                                  "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "lhzojx" /tr "C:\Users\Admin\AppData\Roaming\lhzojx.exe"
                                                                                                                                                                  6⤵
                                                                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                  PID:4200
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ckendf.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ckendf.exe"
                                                                                                                                                                  6⤵
                                                                                                                                                                    PID:2256
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\onrttv.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\onrttv.exe"
                                                                                                                                                                    6⤵
                                                                                                                                                                      PID:4976
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\kcsnia.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\kcsnia.exe"
                                                                                                                                                                      6⤵
                                                                                                                                                                        PID:3700
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\jcbpnm.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\jcbpnm.exe"
                                                                                                                                                                      5⤵
                                                                                                                                                                        PID:3740
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\fflqtl.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\fflqtl.exe"
                                                                                                                                                                        5⤵
                                                                                                                                                                          PID:1396
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\spzjaq.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\spzjaq.exe"
                                                                                                                                                                          5⤵
                                                                                                                                                                            PID:2392
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\uwaysh.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\uwaysh.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                          PID:4056
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\lyktfe.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\lyktfe.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:3272
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\pnboph.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\pnboph.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                            PID:4984
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\yljkcp.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\yljkcp.exe"
                                                                                                                                                                            4⤵
                                                                                                                                                                              PID:3988
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\iixbig.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\iixbig.exe"
                                                                                                                                                                              4⤵
                                                                                                                                                                                PID:2552
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\hglmra.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\hglmra.exe"
                                                                                                                                                                                4⤵
                                                                                                                                                                                  PID:812
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\dplsym.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\dplsym.exe"
                                                                                                                                                                                  4⤵
                                                                                                                                                                                    PID:1496
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\fslkaa.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\fslkaa.exe"
                                                                                                                                                                                    4⤵
                                                                                                                                                                                      PID:1600
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\ffyngc.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\ffyngc.exe"
                                                                                                                                                                                      4⤵
                                                                                                                                                                                        PID:4908
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\fkukqk.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\fkukqk.exe"
                                                                                                                                                                                        4⤵
                                                                                                                                                                                          PID:3328
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\jjqdlz.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\jjqdlz.exe"
                                                                                                                                                                                          4⤵
                                                                                                                                                                                            PID:4044
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tcvaka.exe
                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\tcvaka.exe"
                                                                                                                                                                                            4⤵
                                                                                                                                                                                              PID:3364
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\vgmwek.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\vgmwek.exe"
                                                                                                                                                                                              4⤵
                                                                                                                                                                                                PID:4172
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\dyhwwc.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\dyhwwc.exe"
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                  PID:4028
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\itzihh.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\itzihh.exe"
                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                    PID:1428
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\gsybio.exe
                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\gsybio.exe"
                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                      PID:1468
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\wbgmqy.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\wbgmqy.exe"
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                        PID:3764
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\eeuxsa.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\eeuxsa.exe"
                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                          PID:1496
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\pifjhs.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\pifjhs.exe"
                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                            PID:3348
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\cnnnvr.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\cnnnvr.exe"
                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                              PID:64
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\zkvotr.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\zkvotr.exe"
                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                PID:2420
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\buxxad.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\buxxad.exe"
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                  PID:4544
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\erhjrr.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\erhjrr.exe"
                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                    PID:3136
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\hlbzty.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\hlbzty.exe"
                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                      PID:5060
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\cxlgyu.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\cxlgyu.exe"
                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                        PID:1180
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\flalxg.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\flalxg.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                      PID:2944
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\melcpl.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\melcpl.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                      PID:5072
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\mttfib.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\mttfib.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                      PID:4168
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\akahfh.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\akahfh.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                      PID:3728
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\tttvnt.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\tttvnt.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                      PID:1420
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\mzppvq.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\mzppvq.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                      PID:4324
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\btctpr.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\btctpr.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      PID:3332
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\vwztev.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\vwztev.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:4444
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\hyxufk.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\hyxufk.exe"
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:1148
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\iygtsd.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\iygtsd.exe"
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                            PID:4952
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\nqrrpp.exe
                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\nqrrpp.exe"
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                              PID:3912
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\wwydeo.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\wwydeo.exe"
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                PID:2204
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\yguili.exe
                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\yguili.exe"
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                  PID:2080
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\hapxno.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\hapxno.exe"
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                    PID:3200
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\wstegx.exe
                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\wstegx.exe"
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                      PID:2668
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\jibzgy.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\jibzgy.exe"
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                        PID:3760
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\aegkxh.exe
                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\aegkxh.exe"
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                          PID:968
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\xetjvy.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\xetjvy.exe"
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                            PID:2456
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\qamylr.exe
                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\qamylr.exe"
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                              PID:3648
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\opdcux.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\opdcux.exe"
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:4080
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\wrqbtw.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\wrqbtw.exe"
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                  PID:2060
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\mzzvhh.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\mzzvhh.exe"
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                    PID:4196
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\bxchaj.exe
                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\bxchaj.exe"
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                      PID:216
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\unxvog.exe
                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\unxvog.exe"
                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                        PID:1264
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\klxjkr.exe
                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\klxjkr.exe"
                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                          PID:224
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\vyjjng.exe
                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\vyjjng.exe"
                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                            PID:2456
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\rwkxwv.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\rwkxwv.exe"
                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                              PID:1588
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\zusfwn.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\zusfwn.exe"
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                PID:3604
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\pgpthg.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\pgpthg.exe"
                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                  PID:3896
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\aacjqh.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\aacjqh.exe"
                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                    PID:3748
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\xomcdm.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\xomcdm.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:3160
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\hlbtxq.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\hlbtxq.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:3940
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\pkkrsf.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\pkkrsf.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:3496
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\wysija.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\wysija.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:1416
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\sgksho.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\sgksho.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:388
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\xkbprn.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\xkbprn.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:1884
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\otneby.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\otneby.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:4412
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\nnvour.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\nnvour.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:2204
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\npqiys.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\npqiys.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:4356
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\voemjx.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\voemjx.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:3052
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\boenvm.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\boenvm.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:2968
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\patwdz.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\patwdz.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  PID:1464
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ssxtvw.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ssxtvw.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                    PID:388
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\eemtes.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\eemtes.exe"
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                      PID:2496
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\yoliuc.exe
                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\yoliuc.exe"
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                        PID:3664
                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\jcjpdm.exe
                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\jcjpdm.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                          PID:1308
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\uasiyu.exe
                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\uasiyu.exe"
                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                            PID:3516
                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\xrmqqg.exe
                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\xrmqqg.exe"
                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                              PID:3172
                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ubsihf.exe
                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\ubsihf.exe"
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                PID:4184
                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\lhjmog.exe
                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\lhjmog.exe"
                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                  PID:3252
                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ahgqma.exe
                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ahgqma.exe"
                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                    PID:4908
                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\pcplzv.exe
                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\pcplzv.exe"
                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                      PID:1932
                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\dwfrvn.exe
                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\dwfrvn.exe"
                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                        PID:4392
                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\fhyfns.exe
                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\fhyfns.exe"
                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                          PID:1808
                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\kaueev.exe
                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\kaueev.exe"
                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                            PID:1680
                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\dillir.exe
                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\dillir.exe"
                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                              PID:3100
                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ohelbn.exe
                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\ohelbn.exe"
                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                PID:3796
                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\rjcwek.exe
                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\rjcwek.exe"
                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                  PID:1384
                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ztmwgh.exe
                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ztmwgh.exe"
                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                    PID:4080
                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ivtngm.exe
                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\ivtngm.exe"
                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                      PID:2612
                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\flyuiq.exe
                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\flyuiq.exe"
                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                        PID:624
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\ksondo.exe
                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\ksondo.exe"
                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                          PID:3056
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\iugloe.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\iugloe.exe"
                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                            PID:4740
                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\qnwkfl.exe
                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\qnwkfl.exe"
                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                              PID:4412
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\igcedm.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\igcedm.exe"
                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                PID:4344
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:3932
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:3964
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:528
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:4912
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:868
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\gjovrn.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\gjovrn.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:4752
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:2000
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:1632
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\gjovrn.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\gjovrn.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:2036
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\efvfvi.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\efvfvi.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:2412
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\efvfvi.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\efvfvi.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:3540
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:3724
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:1812
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\gjovrn.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\gjovrn.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:2124
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\oezjlq.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\oezjlq.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:1404
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\efvfvi.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\efvfvi.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:460
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:2332
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\oezjlq.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\oezjlq.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:388
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:3380
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\gjovrn.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\gjovrn.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:2980
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\tovfno.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\tovfno.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:4040
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\efvfvi.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\efvfvi.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:1816
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\tovfno.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\tovfno.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:3744
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:4364
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\oezjlq.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\oezjlq.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:116
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:3396
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\gjovrn.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\gjovrn.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:1468
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\efvfvi.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\efvfvi.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                PID:3796
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\tovfno.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\tovfno.exe
                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                  PID:3308
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                    PID:4908
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\oezjlq.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\oezjlq.exe
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                      PID:4316
                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                        PID:3376
                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\gjovrn.exe
                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\gjovrn.exe
                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                          PID:652
                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\uukeii.exe
                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\uukeii.exe
                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                            PID:1140
                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\efvfvi.exe
                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\efvfvi.exe
                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                              PID:4092
                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\tovfno.exe
                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\tovfno.exe
                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                PID:664
                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\uukeii.exe
                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\uukeii.exe
                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                  PID:2532
                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                    PID:4612
                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                      PID:4144
                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\oezjlq.exe
                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\oezjlq.exe
                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                        PID:2232
                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\gjovrn.exe
                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\gjovrn.exe
                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                          PID:4628
                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\gjovrn.exe
                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\gjovrn.exe
                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                            PID:2472
                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\efvfvi.exe
                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\efvfvi.exe
                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                              PID:3164
                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\tovfno.exe
                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\tovfno.exe
                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                PID:2556
                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\uukeii.exe
                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\uukeii.exe
                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                  PID:2024
                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                    PID:4164
                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                      PID:4552
                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\oezjlq.exe
                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\oezjlq.exe
                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                        PID:2152
                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\degiem.exe
                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\degiem.exe
                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                          PID:1440
                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\gjovrn.exe
                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\gjovrn.exe
                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                            PID:5036
                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\efvfvi.exe
                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\efvfvi.exe
                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                              PID:4876
                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\tovfno.exe
                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\tovfno.exe
                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                PID:2296
                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\uukeii.exe
                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\uukeii.exe
                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                  PID:3128
                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\degiem.exe
                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\degiem.exe
                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                    PID:2596
                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                      PID:1800
                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                        PID:4732
                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\oezjlq.exe
                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\oezjlq.exe
                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                          PID:3168
                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\vnsxyq.exe
                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\vnsxyq.exe
                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                            PID:4528
                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\gjovrn.exe
                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\gjovrn.exe
                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                              PID:4116
                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\efvfvi.exe
                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\efvfvi.exe
                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                PID:3496
                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\tovfno.exe
                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\tovfno.exe
                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                  PID:4024
                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\uukeii.exe
                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\uukeii.exe
                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                    PID:4508
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\degiem.exe
                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\degiem.exe
                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                      PID:3576
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                        PID:3328
                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                          PID:4844
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\oezjlq.exe
                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\oezjlq.exe
                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                            PID:5088
                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\vnsxyq.exe
                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\vnsxyq.exe
                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                              PID:2544
                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\bivoin.exe
                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\bivoin.exe
                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                PID:3540
                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\gjovrn.exe
                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\gjovrn.exe
                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                  PID:3152
                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\efvfvi.exe
                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\efvfvi.exe
                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                    PID:3236
                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\bivoin.exe
                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\bivoin.exe
                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                      PID:3368
                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\tovfno.exe
                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\tovfno.exe
                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                        PID:4104
                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\uukeii.exe
                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\uukeii.exe
                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                          PID:3228
                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\degiem.exe
                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\degiem.exe
                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                            PID:4044
                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                              PID:624
                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\oezjlq.exe
                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\oezjlq.exe
                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                PID:3172
                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                  PID:1044
                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\vnsxyq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\vnsxyq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                    PID:4628
                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\lhzojx.exe
                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\lhzojx.exe
                                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:4748
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\lhzojx.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\lhzojx.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                        PID:3272
                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\gjovrn.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\gjovrn.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                          PID:1188
                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\efvfvi.exe
                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\efvfvi.exe
                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                            PID:4028
                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\bivoin.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\bivoin.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                              PID:2012
                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\tovfno.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\tovfno.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                PID:4624
                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\uukeii.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\uukeii.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:1504
                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\degiem.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\degiem.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:3368
                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:4808
                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:4972
                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\oezjlq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\oezjlq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:3224
                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\vnsxyq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\vnsxyq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:2036
                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\lhzojx.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\lhzojx.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:4848
                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\gjovrn.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\gjovrn.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:4916
                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\efvfvi.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\efvfvi.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:1796
                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\bivoin.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\bivoin.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:3672
                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\tovfno.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\tovfno.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:3576
                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\uukeii.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\uukeii.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:2440
                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\degiem.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\degiem.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:1008
                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\gscpca.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:4528
                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\oezjlq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\oezjlq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:2152
                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:2188
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\vnsxyq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\vnsxyq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:2000

                                                                                                                                                                                                                                                                                                                                                                                                                                                                Network

                                                                                                                                                                                                                                                                                                                                                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                                                                                                                                                                                Replay Monitor

                                                                                                                                                                                                                                                                                                                                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                                                                                                                                                                                Downloads

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\xomcdm.exe.log

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  654B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2ff39f6c7249774be85fd60a8f9a245e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  684ff36b31aedc1e587c8496c02722c6698c1c4e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  944B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6d42b6da621e8df5674e26b799c8e2aa

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  944B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  34f595487e6bfd1d11c7de88ee50356a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4caad088c15766cc0fa1f42009260e9a02f953bb

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0f9a4b52e01cb051052228a55d0515911b7ef5a8db3cf925528c746df511424d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  10976c5deaf9fac449e703e852c3b08d099f430de2d7c7b8e2525c35d63e28b890e5aab63feff9b20bca0aaf9f35a3ba411aee3fbeee9ea59f90ed25bd617a0b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_z50nsmzm.aop.ps1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  60B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\bivoin.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  159KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c73cfd1942fdfaf5d6f3940ca42bbadd

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9c9424953c85d03daf296d7841577228d15e1884

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3d735b082f087b25561d293d17a6cda64326f3d48c1db53a2941ded1afc78773

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9d7ce397b67e704773f7a9ea6c9cd1e5345f2211a67ac5dd5f622118690ed295a18e763c47e5c208240f71d4bedb67ba1e869faff466602f8e97350f9df9495c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\degiem.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  161KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a2e166ef9ba63b78150b9e08767d0764

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  885c223c8436ee6184f6335f3bcf7bd761e85319

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0626693b0820897af0b56b9092439ce955a2435b610127d1686ea256eddc230f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  04651a2f9f4d648b95e7a5e67a1e1ddbaa12d8d2d1fecbf2da956b58826ad2f0aee2b1e182b1beab3f73215185f7c402df67fed4e0bcf401a2eea64ec34c627b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\efvfvi.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  166KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7a7586c1278ecdb7881a3b34f841b722

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8c991bb42729a7e34a096f9d3b23e7e0a25329a8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e2e527d70759106b6d1f479d0a1edd99d9b57c7fdfde2fffd1705e2161438a7f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  79ddd9f08587767ab6b2b66fa7873b0de9a51b8ee52abe8b9ed7e7cf9c42ddd3e45069e978bde40e1708c44a7d8c6a5c271e1dd7129501227dcd8dc5477872b2

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\gjovrn.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  159KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  49a6b6e8627762b929999b0b1fe6d604

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4a47bbb17c6cbda79794428df97d203b7261af79

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ca6aa52d419303376de2c37b4c8f6bdd41e31e55de6d178520ad5056303b6571

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c967dcb9be6b1fa73f1ef50a7785c17919365857be63923c6cad53362931d9a1c9fb41a43d68a050ad2a50239580fc8294e61e2ba10ee19d185f4f91c035b85b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\gscpca.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  34KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  950d739da650457fab6a225545794238

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e965286161ecda1b8c0072d8a2d80c191bb15705

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a571fcac5384158c4927e7c7cf07182b68eccf67845ba927beae44cd9835e3f8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b7b91343176c5a7f6408b21fbc96c23d0b02c080b846e29f304ba91de1d0f37a772953e7ab65d1d627cb3490fbef3b85681564e878d8dcda57c0897dbad1d19b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\lhzojx.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  158KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  eccccd69bbde41339441e5278f21bc10

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d1d96bfea61f93c10064417f3682bcebd682a7ad

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  69074dfb9990c949ae7238d95ff74d2cd294e54759ee1f087519aec081098541

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  edb20574c49e7495eef969113f3a38979b8ef85669da30de4c0e0632ea2467fc3e11ef62686e32b5c90d29e99abc66d5cdc97d5bc420f356eb04b72e71553dea

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\oezjlq.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  156KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e2cf7cb958bda8d948e80bdb78d6e283

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  34c18cf619966914046b7a8f9070b0ee9ca0523d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  07f878b812dc294a61fb6030dffab309e4a05bef322759a198f110aa88c3b402

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3197a3a08069a2a33cea248503132dff4369efe6b83d13db61ef5be81e26f5c3f57ecba9c31e73754f321848dcf491f19eb0249f5f182c2332ae0879ed84b56c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\qeydpi.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  30KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d8a05fae946f16dbb12d5489f2b68230

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f8068ceb85905539ed39dc4dc187088487b09e17

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7876b3d0721a40d4d80f873be9ff79e722e28bd24ba0ee9ab9faac5c7aa69899

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  661fc778e40c260756d928fe3bed91c3cbc8884ac27a071e1bf3c8f97c9133bd4bd853371baed477a3988305c12e1c405d03059f8652d810a23eb6050f6ade77

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tovfno.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  152KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c0a4054bc0a6553d3a246d91e6cdc95b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b8722a0cf5483539ce965098fb299ad129d1a36b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0c20402e4957de72ae5e6c5ce00d0dfab6a49affb260996b3290d44264977909

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5f5e88e876e6363992cd28794203874d27fc204bc7df004d32bfa18ebd0797c8c89ccb6b4cc44d4bdf6a9b476d5be5bec2a91bdc7020ba7b3628b98c9587ea5e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\uukeii.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  151KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5cdc9671612660bd34747c635218a649

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8cebfbdfc27689d9988d4512da7d855c13eb8e0b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  119b3e5a0b2aad4dc9a6a7376dde77e80826830a24a08aefd858710e79a11db9

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a33bfb9c9db6469274a38bee8038fa7a86b2e336e48776bee788b7b2b372556b5880253cdc7856339130ca8b29c199a739020e78ca29cc401f441e2ac18280ef

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\vnsxyq.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  161KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  760aa2ef40d31c55f0019cc916e9de48

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0228e46ca0a0303bebf54a65bf5da8111c4de402

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7ae58db4879d8daf291c5eab58ca9b49bc1b5c63153a02d175d83406a71a2806

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ce85a4af522b22d696ff98e176e2f97280363ac5e4161e39dac8cb0404af8d20fc4efe0ddd9e39cfa07bef28b65960c9a56822c6436b715f37ec6df9bd512d04

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  59KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6c091ad6fae0fa76f44870d1a1b05cb4

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  040f60c0ee3f4902f919025057e34ab4d11b1abd

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/264-392-0x0000000000EF0000-0x0000000000F1C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/512-29-0x0000000000240000-0x000000000024E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1876-10-0x00007FFE22350000-0x00007FFE22E11000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1876-11-0x00007FFE22350000-0x00007FFE22E11000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1876-1-0x00000000007E0000-0x00000000007F6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1876-0-0x00007FFE22353000-0x00007FFE22355000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1936-1731-0x0000000000580000-0x00000000005AE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2632-1561-0x0000000000F60000-0x0000000000F8E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2784-113-0x0000000000AC0000-0x0000000000AEE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2896-483-0x0000000000850000-0x000000000085E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/3232-37-0x0000023D72FD0000-0x0000023D72FF2000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  136KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/3932-14-0x00007FFE22350000-0x00007FFE22E11000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/3932-16-0x00007FFE22350000-0x00007FFE22E11000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/3952-632-0x0000000000C60000-0x0000000000C8C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4108-1342-0x0000000000FF0000-0x000000000101E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4928-225-0x00000000009E0000-0x0000000000A10000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4988-313-0x0000000000220000-0x000000000024E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/5108-1154-0x0000000000A00000-0x0000000000A2E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB