Analysis

  • max time kernel
    899s
  • max time network
    901s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250217-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    06/03/2025, 18:11

General

  • Target

    15415145.exe

  • Size

    59KB

  • MD5

    6c091ad6fae0fa76f44870d1a1b05cb4

  • SHA1

    040f60c0ee3f4902f919025057e34ab4d11b1abd

  • SHA256

    c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

  • SHA512

    3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

  • SSDEEP

    1536:skyZtyUQ8sBkROLW+UzbTH3gfm2qt0OgSko7:skItfQ8sBkROUzbTQf+6OgK7

Malware Config

Extracted

Family

xworm

Version

3.1

C2

known-savage.gl.at.ply.gg:45116

association-lectures.gl.at.ply.gg:32463

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain
aes.plain

Signatures

  • Detect Xworm Payload 24 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 11 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 22 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\15415145.exe
    "C:\Users\Admin\AppData\Local\Temp\15415145.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "15415145" /tr "C:\Users\Admin\AppData\Roaming\15415145.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:4516
    • C:\Users\Admin\AppData\Local\Temp\jcthmj.exe
      "C:\Users\Admin\AppData\Local\Temp\jcthmj.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5064
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\jcthmj.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:524
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'jcthmj.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3116
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\jcthmj.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:408
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "jcthmj" /tr "C:\Users\Admin\AppData\Roaming\jcthmj.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2196
    • C:\Users\Admin\AppData\Local\Temp\xqcsgr.exe
      "C:\Users\Admin\AppData\Local\Temp\xqcsgr.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:5028
    • C:\Users\Admin\AppData\Local\Temp\ykpakp.exe
      "C:\Users\Admin\AppData\Local\Temp\ykpakp.exe"
      2⤵
      • Executes dropped EXE
      PID:684
    • C:\Users\Admin\AppData\Local\Temp\osuqvw.exe
      "C:\Users\Admin\AppData\Local\Temp\osuqvw.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:2396
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "osuqvw" /tr "C:\Users\Admin\AppData\Roaming\osuqvw.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2492
      • C:\Users\Admin\AppData\Local\Temp\epudqo.exe
        "C:\Users\Admin\AppData\Local\Temp\epudqo.exe"
        3⤵
        • Executes dropped EXE
        PID:3868
      • C:\Users\Admin\AppData\Local\Temp\qxowei.exe
        "C:\Users\Admin\AppData\Local\Temp\qxowei.exe"
        3⤵
        • Checks computer location settings
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of WriteProcessMemory
        PID:3612
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "qxowei" /tr "C:\Users\Admin\AppData\Roaming\qxowei.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:3960
        • C:\Users\Admin\AppData\Local\Temp\zptzrg.exe
          "C:\Users\Admin\AppData\Local\Temp\zptzrg.exe"
          4⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1048
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "zptzrg" /tr "C:\Users\Admin\AppData\Roaming\zptzrg.exe"
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:4584
          • C:\Users\Admin\AppData\Local\Temp\tqzvpm.exe
            "C:\Users\Admin\AppData\Local\Temp\tqzvpm.exe"
            5⤵
            • Executes dropped EXE
            PID:1992
          • C:\Users\Admin\AppData\Local\Temp\sxcbde.exe
            "C:\Users\Admin\AppData\Local\Temp\sxcbde.exe"
            5⤵
            • Executes dropped EXE
            PID:1920
          • C:\Users\Admin\AppData\Local\Temp\nwrhbo.exe
            "C:\Users\Admin\AppData\Local\Temp\nwrhbo.exe"
            5⤵
            • Executes dropped EXE
            PID:3188
          • C:\Users\Admin\AppData\Local\Temp\drgclu.exe
            "C:\Users\Admin\AppData\Local\Temp\drgclu.exe"
            5⤵
            • Executes dropped EXE
            PID:3156
          • C:\Users\Admin\AppData\Local\Temp\rwxwwg.exe
            "C:\Users\Admin\AppData\Local\Temp\rwxwwg.exe"
            5⤵
              PID:3648
            • C:\Users\Admin\AppData\Local\Temp\hnbxjm.exe
              "C:\Users\Admin\AppData\Local\Temp\hnbxjm.exe"
              5⤵
                PID:1948
              • C:\Users\Admin\AppData\Local\Temp\cdblul.exe
                "C:\Users\Admin\AppData\Local\Temp\cdblul.exe"
                5⤵
                  PID:2920
                • C:\Users\Admin\AppData\Local\Temp\gmyzht.exe
                  "C:\Users\Admin\AppData\Local\Temp\gmyzht.exe"
                  5⤵
                    PID:1560
                  • C:\Users\Admin\AppData\Local\Temp\xcswjz.exe
                    "C:\Users\Admin\AppData\Local\Temp\xcswjz.exe"
                    5⤵
                      PID:3672
                    • C:\Users\Admin\AppData\Local\Temp\lrffdt.exe
                      "C:\Users\Admin\AppData\Local\Temp\lrffdt.exe"
                      5⤵
                        PID:3452
                      • C:\Users\Admin\AppData\Local\Temp\pwbwtq.exe
                        "C:\Users\Admin\AppData\Local\Temp\pwbwtq.exe"
                        5⤵
                          PID:2080
                        • C:\Users\Admin\AppData\Local\Temp\cqnffy.exe
                          "C:\Users\Admin\AppData\Local\Temp\cqnffy.exe"
                          5⤵
                            PID:3808
                          • C:\Users\Admin\AppData\Local\Temp\mswuvz.exe
                            "C:\Users\Admin\AppData\Local\Temp\mswuvz.exe"
                            5⤵
                              PID:4668
                            • C:\Users\Admin\AppData\Local\Temp\vrpezt.exe
                              "C:\Users\Admin\AppData\Local\Temp\vrpezt.exe"
                              5⤵
                                PID:1916
                              • C:\Users\Admin\AppData\Local\Temp\oldcmr.exe
                                "C:\Users\Admin\AppData\Local\Temp\oldcmr.exe"
                                5⤵
                                  PID:4372
                                • C:\Users\Admin\AppData\Local\Temp\gwzivx.exe
                                  "C:\Users\Admin\AppData\Local\Temp\gwzivx.exe"
                                  5⤵
                                    PID:3608
                                  • C:\Users\Admin\AppData\Local\Temp\kksiwq.exe
                                    "C:\Users\Admin\AppData\Local\Temp\kksiwq.exe"
                                    5⤵
                                      PID:1804
                                    • C:\Users\Admin\AppData\Local\Temp\frxtjr.exe
                                      "C:\Users\Admin\AppData\Local\Temp\frxtjr.exe"
                                      5⤵
                                        PID:344
                                      • C:\Users\Admin\AppData\Local\Temp\cqwgjm.exe
                                        "C:\Users\Admin\AppData\Local\Temp\cqwgjm.exe"
                                        5⤵
                                          PID:1972
                                        • C:\Users\Admin\AppData\Local\Temp\elxhii.exe
                                          "C:\Users\Admin\AppData\Local\Temp\elxhii.exe"
                                          5⤵
                                            PID:4148
                                          • C:\Users\Admin\AppData\Local\Temp\naewyi.exe
                                            "C:\Users\Admin\AppData\Local\Temp\naewyi.exe"
                                            5⤵
                                              PID:1488
                                            • C:\Users\Admin\AppData\Local\Temp\yewzkl.exe
                                              "C:\Users\Admin\AppData\Local\Temp\yewzkl.exe"
                                              5⤵
                                                PID:2556
                                              • C:\Users\Admin\AppData\Local\Temp\gnvyyh.exe
                                                "C:\Users\Admin\AppData\Local\Temp\gnvyyh.exe"
                                                5⤵
                                                  PID:2668
                                                • C:\Users\Admin\AppData\Local\Temp\vubmzv.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\vubmzv.exe"
                                                  5⤵
                                                    PID:4568
                                                  • C:\Users\Admin\AppData\Local\Temp\vanndk.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\vanndk.exe"
                                                    5⤵
                                                      PID:2508
                                                    • C:\Users\Admin\AppData\Local\Temp\acckvw.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\acckvw.exe"
                                                      5⤵
                                                        PID:2752
                                                    • C:\Users\Admin\AppData\Local\Temp\duszye.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\duszye.exe"
                                                      4⤵
                                                      • Executes dropped EXE
                                                      PID:3752
                                                    • C:\Users\Admin\AppData\Local\Temp\yiniyk.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\yiniyk.exe"
                                                      4⤵
                                                      • Checks computer location settings
                                                      • Drops startup file
                                                      • Executes dropped EXE
                                                      • Adds Run key to start application
                                                      PID:3220
                                                      • C:\Windows\System32\schtasks.exe
                                                        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "yiniyk" /tr "C:\Users\Admin\AppData\Roaming\yiniyk.exe"
                                                        5⤵
                                                        • Scheduled Task/Job: Scheduled Task
                                                        PID:3460
                                                      • C:\Users\Admin\AppData\Local\Temp\lubzvc.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\lubzvc.exe"
                                                        5⤵
                                                        • Executes dropped EXE
                                                        PID:548
                                                      • C:\Users\Admin\AppData\Local\Temp\wjfjhe.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\wjfjhe.exe"
                                                        5⤵
                                                        • Executes dropped EXE
                                                        PID:2996
                                                      • C:\Users\Admin\AppData\Local\Temp\spkqql.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\spkqql.exe"
                                                        5⤵
                                                          PID:1548
                                                        • C:\Users\Admin\AppData\Local\Temp\udcexa.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\udcexa.exe"
                                                          5⤵
                                                          • Checks computer location settings
                                                          • Drops startup file
                                                          • Adds Run key to start application
                                                          PID:1992
                                                          • C:\Windows\System32\schtasks.exe
                                                            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "udcexa" /tr "C:\Users\Admin\AppData\Roaming\udcexa.exe"
                                                            6⤵
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:2556
                                                          • C:\Users\Admin\AppData\Local\Temp\ezulvo.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\ezulvo.exe"
                                                            6⤵
                                                              PID:4504
                                                            • C:\Users\Admin\AppData\Local\Temp\nllwaf.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\nllwaf.exe"
                                                              6⤵
                                                                PID:4212
                                                              • C:\Users\Admin\AppData\Local\Temp\nccarv.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\nccarv.exe"
                                                                6⤵
                                                                  PID:4028
                                                                • C:\Users\Admin\AppData\Local\Temp\refisk.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\refisk.exe"
                                                                  6⤵
                                                                    PID:3000
                                                                  • C:\Users\Admin\AppData\Local\Temp\ojbsts.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\ojbsts.exe"
                                                                    6⤵
                                                                      PID:2500
                                                                    • C:\Users\Admin\AppData\Local\Temp\elaeom.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\elaeom.exe"
                                                                      6⤵
                                                                        PID:2236
                                                                      • C:\Users\Admin\AppData\Local\Temp\jgyoap.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\jgyoap.exe"
                                                                        6⤵
                                                                          PID:2512
                                                                        • C:\Users\Admin\AppData\Local\Temp\lrbdth.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\lrbdth.exe"
                                                                          6⤵
                                                                            PID:4156
                                                                          • C:\Users\Admin\AppData\Local\Temp\gnstwm.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\gnstwm.exe"
                                                                            6⤵
                                                                              PID:3164
                                                                            • C:\Users\Admin\AppData\Local\Temp\swhkxm.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\swhkxm.exe"
                                                                              6⤵
                                                                                PID:1912
                                                                              • C:\Users\Admin\AppData\Local\Temp\mvssso.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\mvssso.exe"
                                                                                6⤵
                                                                                  PID:1208
                                                                                • C:\Users\Admin\AppData\Local\Temp\fjnqqk.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\fjnqqk.exe"
                                                                                  6⤵
                                                                                    PID:984
                                                                                  • C:\Users\Admin\AppData\Local\Temp\xceqwa.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\xceqwa.exe"
                                                                                    6⤵
                                                                                      PID:4840
                                                                                    • C:\Users\Admin\AppData\Local\Temp\jkptmf.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\jkptmf.exe"
                                                                                      6⤵
                                                                                        PID:4536
                                                                                      • C:\Users\Admin\AppData\Local\Temp\alonls.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\alonls.exe"
                                                                                        6⤵
                                                                                          PID:2316
                                                                                        • C:\Users\Admin\AppData\Local\Temp\ezjlbf.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\ezjlbf.exe"
                                                                                          6⤵
                                                                                            PID:4092
                                                                                          • C:\Users\Admin\AppData\Local\Temp\wtzmyk.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\wtzmyk.exe"
                                                                                            6⤵
                                                                                              PID:4784
                                                                                            • C:\Users\Admin\AppData\Local\Temp\upwhwu.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\upwhwu.exe"
                                                                                              6⤵
                                                                                                PID:2488
                                                                                            • C:\Users\Admin\AppData\Local\Temp\ngieln.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\ngieln.exe"
                                                                                              5⤵
                                                                                                PID:792
                                                                                              • C:\Users\Admin\AppData\Local\Temp\apanvk.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\apanvk.exe"
                                                                                                5⤵
                                                                                                  PID:1052
                                                                                                • C:\Users\Admin\AppData\Local\Temp\rsnecq.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\rsnecq.exe"
                                                                                                  5⤵
                                                                                                    PID:1768
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\cjhril.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\cjhril.exe"
                                                                                                    5⤵
                                                                                                      PID:3296
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\jdzwtx.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\jdzwtx.exe"
                                                                                                      5⤵
                                                                                                        PID:4044
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\sgxalp.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\sgxalp.exe"
                                                                                                        5⤵
                                                                                                          PID:3812
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\urxsis.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\urxsis.exe"
                                                                                                          5⤵
                                                                                                            PID:2488
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\efuzyx.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\efuzyx.exe"
                                                                                                            5⤵
                                                                                                              PID:1308
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\xpalbn.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\xpalbn.exe"
                                                                                                              5⤵
                                                                                                              • Checks computer location settings
                                                                                                              • Drops startup file
                                                                                                              • Adds Run key to start application
                                                                                                              PID:1980
                                                                                                              • C:\Windows\System32\schtasks.exe
                                                                                                                "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "xpalbn" /tr "C:\Users\Admin\AppData\Roaming\xpalbn.exe"
                                                                                                                6⤵
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:1284
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\bhfebd.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\bhfebd.exe"
                                                                                                                6⤵
                                                                                                                • Checks computer location settings
                                                                                                                • Drops startup file
                                                                                                                • Adds Run key to start application
                                                                                                                PID:2160
                                                                                                                • C:\Windows\System32\schtasks.exe
                                                                                                                  "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "bhfebd" /tr "C:\Users\Admin\AppData\Roaming\bhfebd.exe"
                                                                                                                  7⤵
                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                  PID:272
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\fcdvnr.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\fcdvnr.exe"
                                                                                                                  7⤵
                                                                                                                  • Checks computer location settings
                                                                                                                  • Drops startup file
                                                                                                                  • Adds Run key to start application
                                                                                                                  PID:3284
                                                                                                                  • C:\Windows\System32\schtasks.exe
                                                                                                                    "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "fcdvnr" /tr "C:\Users\Admin\AppData\Roaming\fcdvnr.exe"
                                                                                                                    8⤵
                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                    PID:556
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\cydchk.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\cydchk.exe"
                                                                                                                    8⤵
                                                                                                                      PID:4248
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\aujrir.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\aujrir.exe"
                                                                                                                      8⤵
                                                                                                                        PID:3736
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\hrzwpb.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\hrzwpb.exe"
                                                                                                                        8⤵
                                                                                                                          PID:1204
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\jjyuqw.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\jjyuqw.exe"
                                                                                                                          8⤵
                                                                                                                            PID:5080
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\tfohdy.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\tfohdy.exe"
                                                                                                                          7⤵
                                                                                                                            PID:5044
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\raggjv.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\raggjv.exe"
                                                                                                                            7⤵
                                                                                                                            • Checks computer location settings
                                                                                                                            • Drops startup file
                                                                                                                            • Adds Run key to start application
                                                                                                                            PID:3276
                                                                                                                            • C:\Windows\System32\schtasks.exe
                                                                                                                              "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "raggjv" /tr "C:\Users\Admin\AppData\Roaming\raggjv.exe"
                                                                                                                              8⤵
                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                              PID:2296
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ztbkqy.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\ztbkqy.exe"
                                                                                                                              8⤵
                                                                                                                                PID:1744
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ykgvtk.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ykgvtk.exe"
                                                                                                                                8⤵
                                                                                                                                  PID:1016
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\qbpxlj.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\qbpxlj.exe"
                                                                                                                                  8⤵
                                                                                                                                    PID:2376
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\jkepio.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\jkepio.exe"
                                                                                                                                  7⤵
                                                                                                                                    PID:1376
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ywkxow.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\ywkxow.exe"
                                                                                                                                    7⤵
                                                                                                                                      PID:2112
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\ebczbf.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\ebczbf.exe"
                                                                                                                                      7⤵
                                                                                                                                        PID:3308
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\xxdxve.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\xxdxve.exe"
                                                                                                                                      6⤵
                                                                                                                                        PID:1660
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\yoseef.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\yoseef.exe"
                                                                                                                                        6⤵
                                                                                                                                          PID:4488
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\orlnky.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\orlnky.exe"
                                                                                                                                          6⤵
                                                                                                                                            PID:3992
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\roekxx.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\roekxx.exe"
                                                                                                                                            6⤵
                                                                                                                                              PID:1892
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\jerlpu.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\jerlpu.exe"
                                                                                                                                              6⤵
                                                                                                                                                PID:2020
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\gnripy.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\gnripy.exe"
                                                                                                                                                6⤵
                                                                                                                                                  PID:796
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\kqhysh.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\kqhysh.exe"
                                                                                                                                                  6⤵
                                                                                                                                                    PID:5024
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\olqjge.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\olqjge.exe"
                                                                                                                                                    6⤵
                                                                                                                                                      PID:3000
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\twxwvi.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\twxwvi.exe"
                                                                                                                                                    5⤵
                                                                                                                                                      PID:1160
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\nevcvo.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\nevcvo.exe"
                                                                                                                                                      5⤵
                                                                                                                                                        PID:1440
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nrhyjl.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\nrhyjl.exe"
                                                                                                                                                        5⤵
                                                                                                                                                          PID:4576
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\tkbond.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\tkbond.exe"
                                                                                                                                                          5⤵
                                                                                                                                                            PID:4656
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\rkebye.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\rkebye.exe"
                                                                                                                                                            5⤵
                                                                                                                                                              PID:3636
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\wgfkgp.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\wgfkgp.exe"
                                                                                                                                                              5⤵
                                                                                                                                                                PID:2284
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\rxwoee.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\rxwoee.exe"
                                                                                                                                                                5⤵
                                                                                                                                                                  PID:4868
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\xbjgmh.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\xbjgmh.exe"
                                                                                                                                                                  5⤵
                                                                                                                                                                    PID:4284
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\qyfprr.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\qyfprr.exe"
                                                                                                                                                                    5⤵
                                                                                                                                                                      PID:1972
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\mejufl.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\mejufl.exe"
                                                                                                                                                                      5⤵
                                                                                                                                                                        PID:4584
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\emgqfo.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\emgqfo.exe"
                                                                                                                                                                        5⤵
                                                                                                                                                                          PID:3960
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\dfmtvi.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\dfmtvi.exe"
                                                                                                                                                                        4⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        PID:4848
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\aspzrr.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\aspzrr.exe"
                                                                                                                                                                        4⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        PID:1764
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\eqahnd.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\eqahnd.exe"
                                                                                                                                                                        4⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        PID:2388
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\njgucz.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\njgucz.exe"
                                                                                                                                                                        4⤵
                                                                                                                                                                          PID:4852
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\zwjbsn.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\zwjbsn.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                            PID:4668
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\jpdnyq.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\jpdnyq.exe"
                                                                                                                                                                            4⤵
                                                                                                                                                                              PID:3156
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\yfukzy.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\yfukzy.exe"
                                                                                                                                                                              4⤵
                                                                                                                                                                                PID:4288
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\recbvh.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\recbvh.exe"
                                                                                                                                                                                4⤵
                                                                                                                                                                                  PID:4880
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\equkuo.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\equkuo.exe"
                                                                                                                                                                                  4⤵
                                                                                                                                                                                    PID:1084
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\eidmuz.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\eidmuz.exe"
                                                                                                                                                                                    4⤵
                                                                                                                                                                                      PID:1660
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\yyabpc.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\yyabpc.exe"
                                                                                                                                                                                      4⤵
                                                                                                                                                                                        PID:3736
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nqskii.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\nqskii.exe"
                                                                                                                                                                                        4⤵
                                                                                                                                                                                          PID:4620
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ickhdy.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\ickhdy.exe"
                                                                                                                                                                                          4⤵
                                                                                                                                                                                            PID:824
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\wxacwb.exe
                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\wxacwb.exe"
                                                                                                                                                                                            4⤵
                                                                                                                                                                                              PID:5088
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\tyupjp.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\tyupjp.exe"
                                                                                                                                                                                              4⤵
                                                                                                                                                                                                PID:3500
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\nlluma.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\nlluma.exe"
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                  PID:5096
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\yqoaoe.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\yqoaoe.exe"
                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                    PID:2524
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ouhmcs.exe
                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\ouhmcs.exe"
                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                      PID:2404
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\dwfeqw.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\dwfeqw.exe"
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                        PID:64
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\ywcyiq.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\ywcyiq.exe"
                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                          PID:992
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\iygdxx.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\iygdxx.exe"
                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                            PID:4856
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\xnqkjm.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\xnqkjm.exe"
                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                              PID:2284
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\jvjvnc.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\jvjvnc.exe"
                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                PID:1104
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ugwcln.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ugwcln.exe"
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                  PID:4088
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\kivowp.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\kivowp.exe"
                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                    PID:752
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ndxbts.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ndxbts.exe"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  PID:3644
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\nyrbiy.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\nyrbiy.exe"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  PID:5028
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\zmqnyd.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\zmqnyd.exe"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  PID:4092
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\lheccn.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\lheccn.exe"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  PID:900
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ytvdww.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ytvdww.exe"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  PID:952
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tmmkev.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\tmmkev.exe"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  PID:3588
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\boqhuy.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\boqhuy.exe"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  PID:3508
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\hcgvde.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\hcgvde.exe"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                    PID:5052
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ycyklw.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\ycyklw.exe"
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                      PID:476
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\elbkda.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\elbkda.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:4832
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\wjcuiw.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\wjcuiw.exe"
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:720
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\mphulk.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\mphulk.exe"
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                            PID:2512
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\mdnfvz.exe
                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\mdnfvz.exe"
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                              PID:3500
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\hcpqet.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\hcpqet.exe"
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                PID:1828
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\xibpft.exe
                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\xibpft.exe"
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                  PID:3980
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\urkqkl.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\urkqkl.exe"
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                    PID:4656
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\wmukjo.exe
                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\wmukjo.exe"
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                      PID:3948
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\weqoyh.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\weqoyh.exe"
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                        PID:636
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\jyqbdb.exe
                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\jyqbdb.exe"
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                          PID:1196
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\lgeixz.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\lgeixz.exe"
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                            PID:2084
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vwjozu.exe
                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\vwjozu.exe"
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                              PID:4604
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\zvsbji.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\zvsbji.exe"
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:560
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ewsbua.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ewsbua.exe"
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                  PID:1548
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\cjjtgh.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\cjjtgh.exe"
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                    PID:392
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\dsojfe.exe
                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\dsojfe.exe"
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                      PID:4516
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\hnpvpn.exe
                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\hnpvpn.exe"
                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                        PID:4372
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\eiewoc.exe
                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\eiewoc.exe"
                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                          PID:3108
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\oiohxg.exe
                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\oiohxg.exe"
                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                            PID:1868
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\jjldgo.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\jjldgo.exe"
                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                              PID:952
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\pbqclg.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\pbqclg.exe"
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                PID:1172
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\zyxvpc.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\zyxvpc.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:3748
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\geevzq.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\geevzq.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:3652
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\zbenix.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\zbenix.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:2732
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ogtnsz.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\ogtnsz.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:3628
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\auihyj.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\auihyj.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:2388
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\dthwin.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\dthwin.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:3108
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\mbaamb.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\mbaamb.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:1480
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ndkzbi.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\ndkzbi.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:3252
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\kakwbp.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\kakwbp.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:3980
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\clgyuv.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\clgyuv.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:5040
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\tygusg.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\tygusg.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:4760
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\jctqbg.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\jctqbg.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:3148
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\xnurao.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\xnurao.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                PID:3168
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\obtzwy.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\obtzwy.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                  PID:4460
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\zgrstw.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\zgrstw.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                    PID:4720
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\hohfhn.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\hohfhn.exe"
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                      PID:4876
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\vslepy.exe
                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\vslepy.exe"
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                        PID:948
                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\puyezo.exe
                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\puyezo.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                          PID:3584
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\uklrjt.exe
                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\uklrjt.exe"
                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                            PID:4764
                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ctciul.exe
                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ctciul.exe"
                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                              PID:4008
                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\orjwjn.exe
                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\orjwjn.exe"
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                PID:5072
                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\zsggwh.exe
                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\zsggwh.exe"
                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                  PID:2148
                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\djlukc.exe
                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\djlukc.exe"
                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                    PID:1440
                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\zvgdxi.exe
                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\zvgdxi.exe"
                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                      PID:680
                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\lpencn.exe
                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\lpencn.exe"
                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                        PID:2112
                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\kmyzqy.exe
                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\kmyzqy.exe"
                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                          PID:4212
                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\otkkfh.exe
                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\otkkfh.exe"
                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                            PID:2284
                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\hoodoa.exe
                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\hoodoa.exe"
                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                              PID:2136
                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\hhjaiz.exe
                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\hhjaiz.exe"
                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                PID:2512
                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\elubku.exe
                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\elubku.exe"
                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                  PID:4344
                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\jlptvj.exe
                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\jlptvj.exe"
                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                    PID:952
                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\jdtmfq.exe
                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\jdtmfq.exe"
                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                      PID:4856
                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\rpqzvj.exe
                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\rpqzvj.exe"
                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                        PID:3912
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\tiaegu.exe
                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\tiaegu.exe"
                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                          PID:3440
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\dkeyuf.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\dkeyuf.exe"
                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                            PID:2020
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                          PID:8
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          PID:1464
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\jcthmj.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\jcthmj.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          PID:2868
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\jcthmj.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\jcthmj.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          PID:2736
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          PID:3084
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\osuqvw.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\osuqvw.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          PID:3496
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\osuqvw.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\osuqvw.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          PID:3772
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\jcthmj.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\jcthmj.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          PID:2896
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          PID:3332
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\qxowei.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\qxowei.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          PID:2308
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\osuqvw.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\osuqvw.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          PID:4772
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\jcthmj.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\jcthmj.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          PID:4088
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\qxowei.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\qxowei.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          PID:3744
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          PID:1772
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\zptzrg.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\zptzrg.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          PID:4736
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\osuqvw.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\osuqvw.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          PID:2988
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\jcthmj.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\jcthmj.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          PID:2292
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\qxowei.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\qxowei.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          PID:4584
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          PID:4124
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\zptzrg.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\zptzrg.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          PID:4716
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\yiniyk.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\yiniyk.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          PID:964
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\osuqvw.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\osuqvw.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          PID:1484
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\jcthmj.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\jcthmj.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          PID:1292
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\qxowei.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\qxowei.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          PID:228
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\yiniyk.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\yiniyk.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          PID:4788
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          PID:1948
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\zptzrg.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\zptzrg.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          PID:2136
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\osuqvw.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\osuqvw.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                            PID:4128
                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\jcthmj.exe
                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\jcthmj.exe"
                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                              PID:4100
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\qxowei.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\qxowei.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                PID:2984
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\yiniyk.exe
                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\yiniyk.exe"
                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                  PID:2948
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                    PID:4248
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\zptzrg.exe
                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\zptzrg.exe"
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                      PID:2860
                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\udcexa.exe
                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\udcexa.exe"
                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                        PID:1880
                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\osuqvw.exe
                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\osuqvw.exe"
                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                          PID:2240
                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\jcthmj.exe
                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\jcthmj.exe"
                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                            PID:2112
                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\qxowei.exe
                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\qxowei.exe"
                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                              PID:4672
                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\udcexa.exe
                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\udcexa.exe"
                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                PID:460
                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\yiniyk.exe
                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\yiniyk.exe"
                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                  PID:4940
                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                    PID:3088
                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\zptzrg.exe
                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\zptzrg.exe"
                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                      PID:2196
                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\zptzrg.exe
                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\zptzrg.exe"
                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                        PID:2816
                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\osuqvw.exe
                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\osuqvw.exe"
                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                          PID:3252
                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\jcthmj.exe
                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\jcthmj.exe"
                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                            PID:3676
                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\qxowei.exe
                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\qxowei.exe"
                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                              PID:4128
                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\udcexa.exe
                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\udcexa.exe"
                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                PID:4656
                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\yiniyk.exe
                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\yiniyk.exe"
                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                  PID:3816
                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                    PID:576
                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\xpalbn.exe
                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\xpalbn.exe"
                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                      PID:2128
                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\zptzrg.exe
                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\zptzrg.exe"
                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                        PID:4368
                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\osuqvw.exe
                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\osuqvw.exe"
                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                          PID:2720
                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\jcthmj.exe
                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\jcthmj.exe"
                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                            PID:4864
                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\xpalbn.exe
                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\xpalbn.exe"
                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                              PID:4084
                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\qxowei.exe
                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\qxowei.exe"
                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                PID:2544
                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\udcexa.exe
                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\udcexa.exe"
                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                  PID:3268
                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\yiniyk.exe
                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\yiniyk.exe"
                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                    PID:524
                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                      PID:1148
                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\bhfebd.exe
                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\bhfebd.exe"
                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                        PID:1900
                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\zptzrg.exe
                                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\zptzrg.exe"
                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                          PID:3744
                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\bhfebd.exe
                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\bhfebd.exe"
                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                            PID:1940
                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\osuqvw.exe
                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\osuqvw.exe"
                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                              PID:4052
                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\jcthmj.exe
                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\jcthmj.exe"
                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                PID:3860
                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\xpalbn.exe
                                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\xpalbn.exe"
                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                  PID:1560
                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\qxowei.exe
                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\qxowei.exe"
                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                    PID:4672
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\udcexa.exe
                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\udcexa.exe"
                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                      PID:2316
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\yiniyk.exe
                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\yiniyk.exe"
                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                        PID:3712
                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                          PID:3960
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\fcdvnr.exe
                                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\fcdvnr.exe"
                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                            PID:3088
                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\zptzrg.exe
                                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\zptzrg.exe"
                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                              PID:752
                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\osuqvw.exe
                                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\osuqvw.exe"
                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                PID:556
                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\bhfebd.exe
                                                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\bhfebd.exe"
                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                  PID:2680
                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\jcthmj.exe
                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\jcthmj.exe"
                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                    PID:188
                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\xpalbn.exe
                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\xpalbn.exe"
                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                      PID:4892
                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\qxowei.exe
                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\qxowei.exe"
                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                        PID:1368
                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\fcdvnr.exe
                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\fcdvnr.exe"
                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                          PID:1272
                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\udcexa.exe
                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\udcexa.exe"
                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                            PID:2488
                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\yiniyk.exe
                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\yiniyk.exe"
                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                              PID:4780
                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                PID:1908
                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\raggjv.exe
                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\raggjv.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                  PID:4868
                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\zptzrg.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\zptzrg.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                    PID:216
                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\osuqvw.exe
                                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\osuqvw.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:5060
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\bhfebd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\bhfebd.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                        PID:2768
                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\jcthmj.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\jcthmj.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                          PID:4840
                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\raggjv.exe
                                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\raggjv.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                            PID:4288
                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\qxowei.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\qxowei.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                              PID:2296
                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\xpalbn.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\xpalbn.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                PID:4848
                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\fcdvnr.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\fcdvnr.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:1896
                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\udcexa.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\udcexa.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:1108
                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\yiniyk.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\yiniyk.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:4768
                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:948
                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\zptzrg.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\zptzrg.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:1308
                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\osuqvw.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\osuqvw.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:3308
                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\bhfebd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\bhfebd.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:2492
                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\jcthmj.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\jcthmj.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:2444
                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\raggjv.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\raggjv.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:4892
                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\xpalbn.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\xpalbn.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:2712
                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\qxowei.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\qxowei.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:4052
                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\fcdvnr.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\fcdvnr.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:4120
                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\udcexa.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\udcexa.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:932
                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\yiniyk.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\yiniyk.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:3016
                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:2680

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Network

                                                                                                                                                                                                                                                                                                                                                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Replay Monitor

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Downloads

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\15415145.exe.log

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              654B

                                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                              11c6e74f0561678d2cf7fc075a6cc00c

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                              535ee79ba978554abcb98c566235805e7ea18490

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                              d39a78fabca39532fcb85ce908781a75132e1bd01cc50a3b290dd87127837d63

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                              32c63d67bf512b42e7f57f71287b354200126cb417ef9d869c72e0b9388a7c2f5e3b61f303f1353baa1bf482d0f17e06e23c9f50b2f1babd4d958b6da19c40b0

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              3KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                              3eb3833f769dd890afc295b977eab4b4

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                              e857649b037939602c72ad003e5d3698695f436f

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                              c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                              c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              1KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                              6a807b1c91ac66f33f88a787d64904c1

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                              83c554c7de04a8115c9005709e5cd01fca82c5d3

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                              155314c1c86d8d4e5b802f1eef603c5dd4a2f7c949f069a38af5ba4959bd8256

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                              29f2d9f30fc081e7fe6e9fb772c810c9be0422afdc6aff5a286f49a990ededebcf0d083798c2d9f41ad8434393c6d0f5fa6df31226d9c3511ba2a41eb4a65200

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              1KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                              33287e49f6eaba2d1ef2051051f82854

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                              bebd7e3e83e10f3fad883a509ecc1e4f3c3d38a5

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                              77e1b16217bb47355474c6a65af74aa0d933e6842840c0cb1674818e21b27792

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                              c068f2c5051ba3c3b240ff4436c281754a9765adb2a80b0c6347a84ddfe0839ee937b736ea3979ba5724cfe17055fc501f0e3127e89052b883b889eb3318eb9c

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_whded25o.mzq.ps1

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              60B

                                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\bhfebd.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              161KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                              760aa2ef40d31c55f0019cc916e9de48

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                              0228e46ca0a0303bebf54a65bf5da8111c4de402

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                              7ae58db4879d8daf291c5eab58ca9b49bc1b5c63153a02d175d83406a71a2806

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                              ce85a4af522b22d696ff98e176e2f97280363ac5e4161e39dac8cb0404af8d20fc4efe0ddd9e39cfa07bef28b65960c9a56822c6436b715f37ec6df9bd512d04

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\fcdvnr.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              159KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                              c73cfd1942fdfaf5d6f3940ca42bbadd

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                              9c9424953c85d03daf296d7841577228d15e1884

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                              3d735b082f087b25561d293d17a6cda64326f3d48c1db53a2941ded1afc78773

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                              9d7ce397b67e704773f7a9ea6c9cd1e5345f2211a67ac5dd5f622118690ed295a18e763c47e5c208240f71d4bedb67ba1e869faff466602f8e97350f9df9495c

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\jcthmj.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              34KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                              950d739da650457fab6a225545794238

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                              e965286161ecda1b8c0072d8a2d80c191bb15705

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                              a571fcac5384158c4927e7c7cf07182b68eccf67845ba927beae44cd9835e3f8

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                              b7b91343176c5a7f6408b21fbc96c23d0b02c080b846e29f304ba91de1d0f37a772953e7ab65d1d627cb3490fbef3b85681564e878d8dcda57c0897dbad1d19b

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\lubzvc.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              30KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                              d8a05fae946f16dbb12d5489f2b68230

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                              f8068ceb85905539ed39dc4dc187088487b09e17

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                              7876b3d0721a40d4d80f873be9ff79e722e28bd24ba0ee9ab9faac5c7aa69899

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                              661fc778e40c260756d928fe3bed91c3cbc8884ac27a071e1bf3c8f97c9133bd4bd853371baed477a3988305c12e1c405d03059f8652d810a23eb6050f6ade77

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\osuqvw.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              159KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                              49a6b6e8627762b929999b0b1fe6d604

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                              4a47bbb17c6cbda79794428df97d203b7261af79

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                              ca6aa52d419303376de2c37b4c8f6bdd41e31e55de6d178520ad5056303b6571

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                              c967dcb9be6b1fa73f1ef50a7785c17919365857be63923c6cad53362931d9a1c9fb41a43d68a050ad2a50239580fc8294e61e2ba10ee19d185f4f91c035b85b

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\qxowei.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              166KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                              7a7586c1278ecdb7881a3b34f841b722

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                              8c991bb42729a7e34a096f9d3b23e7e0a25329a8

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                              e2e527d70759106b6d1f479d0a1edd99d9b57c7fdfde2fffd1705e2161438a7f

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                              79ddd9f08587767ab6b2b66fa7873b0de9a51b8ee52abe8b9ed7e7cf9c42ddd3e45069e978bde40e1708c44a7d8c6a5c271e1dd7129501227dcd8dc5477872b2

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\raggjv.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              158KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                              eccccd69bbde41339441e5278f21bc10

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                              d1d96bfea61f93c10064417f3682bcebd682a7ad

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                              69074dfb9990c949ae7238d95ff74d2cd294e54759ee1f087519aec081098541

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                              edb20574c49e7495eef969113f3a38979b8ef85669da30de4c0e0632ea2467fc3e11ef62686e32b5c90d29e99abc66d5cdc97d5bc420f356eb04b72e71553dea

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\udcexa.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              151KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                              5cdc9671612660bd34747c635218a649

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                              8cebfbdfc27689d9988d4512da7d855c13eb8e0b

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                              119b3e5a0b2aad4dc9a6a7376dde77e80826830a24a08aefd858710e79a11db9

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                              a33bfb9c9db6469274a38bee8038fa7a86b2e336e48776bee788b7b2b372556b5880253cdc7856339130ca8b29c199a739020e78ca29cc401f441e2ac18280ef

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\xpalbn.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              161KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                              a2e166ef9ba63b78150b9e08767d0764

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                              885c223c8436ee6184f6335f3bcf7bd761e85319

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                              0626693b0820897af0b56b9092439ce955a2435b610127d1686ea256eddc230f

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                              04651a2f9f4d648b95e7a5e67a1e1ddbaa12d8d2d1fecbf2da956b58826ad2f0aee2b1e182b1beab3f73215185f7c402df67fed4e0bcf401a2eea64ec34c627b

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\yiniyk.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              152KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                              c0a4054bc0a6553d3a246d91e6cdc95b

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                              b8722a0cf5483539ce965098fb299ad129d1a36b

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                              0c20402e4957de72ae5e6c5ce00d0dfab6a49affb260996b3290d44264977909

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                              5f5e88e876e6363992cd28794203874d27fc204bc7df004d32bfa18ebd0797c8c89ccb6b4cc44d4bdf6a9b476d5be5bec2a91bdc7020ba7b3628b98c9587ea5e

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\zptzrg.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              156KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                              e2cf7cb958bda8d948e80bdb78d6e283

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                              34c18cf619966914046b7a8f9070b0ee9ca0523d

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                              07f878b812dc294a61fb6030dffab309e4a05bef322759a198f110aa88c3b402

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                              3197a3a08069a2a33cea248503132dff4369efe6b83d13db61ef5be81e26f5c3f57ecba9c31e73754f321848dcf491f19eb0249f5f182c2332ae0879ed84b56c

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              59KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                              6c091ad6fae0fa76f44870d1a1b05cb4

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                              040f60c0ee3f4902f919025057e34ab4d11b1abd

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                              c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

                                                                                                                                                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                              3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/8-15-0x00007FFEF9AE0000-0x00007FFEFA5A2000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/8-17-0x00007FFEF9AE0000-0x00007FFEFA5A2000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/524-35-0x000002196D7B0000-0x000002196D7D2000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              136KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/548-553-0x00000000006D0000-0x00000000006DE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1048-349-0x0000000000020000-0x000000000004E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1980-1419-0x0000000000490000-0x00000000004BE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/1992-746-0x0000000000970000-0x000000000099C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2160-1664-0x00000000004A0000-0x00000000004CE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2396-127-0x00000000009A0000-0x00000000009CE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2964-0-0x00007FFEF9AE3000-0x00007FFEF9AE5000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              8KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2964-12-0x00007FFEF9AE0000-0x00007FFEFA5A2000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2964-11-0x00007FFEF9AE3000-0x00007FFEF9AE5000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              8KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2964-10-0x00007FFEF9AE0000-0x00007FFEFA5A2000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/2964-1-0x0000000000FE0000-0x0000000000FF6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/3220-437-0x0000000000B40000-0x0000000000B6C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/3276-2164-0x0000000000520000-0x000000000054E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/3284-1947-0x0000000000E60000-0x0000000000E8E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/3612-233-0x0000000000FF0000-0x0000000001020000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            • memory/5064-33-0x0000000000E20000-0x0000000000E2E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                              56KB