Analysis

  • max time kernel
    897s
  • max time network
    902s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06/03/2025, 18:11

General

  • Target

    15415145.exe

  • Size

    59KB

  • MD5

    6c091ad6fae0fa76f44870d1a1b05cb4

  • SHA1

    040f60c0ee3f4902f919025057e34ab4d11b1abd

  • SHA256

    c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

  • SHA512

    3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

  • SSDEEP

    1536:skyZtyUQ8sBkROLW+UzbTH3gfm2qt0OgSko7:skItfQ8sBkROUzbTQf+6OgK7

Malware Config

Extracted

Family

xworm

Version

3.1

C2

known-savage.gl.at.ply.gg:45116

association-lectures.gl.at.ply.gg:32463

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain
aes.plain

Signatures

  • Detect Xworm Payload 24 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 22 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\15415145.exe
    "C:\Users\Admin\AppData\Local\Temp\15415145.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4584
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "15415145" /tr "C:\Users\Admin\AppData\Roaming\15415145.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:5048
    • C:\Users\Admin\AppData\Local\Temp\ljqysm.exe
      "C:\Users\Admin\AppData\Local\Temp\ljqysm.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4964
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\ljqysm.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2160
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'ljqysm.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1096
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\ljqysm.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2996
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "ljqysm" /tr "C:\Users\Admin\AppData\Roaming\ljqysm.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4744
    • C:\Users\Admin\AppData\Local\Temp\demktp.exe
      "C:\Users\Admin\AppData\Local\Temp\demktp.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2324
    • C:\Users\Admin\AppData\Local\Temp\urbfil.exe
      "C:\Users\Admin\AppData\Local\Temp\urbfil.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3584
    • C:\Users\Admin\AppData\Local\Temp\uhtmta.exe
      "C:\Users\Admin\AppData\Local\Temp\uhtmta.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3320
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "uhtmta" /tr "C:\Users\Admin\AppData\Roaming\uhtmta.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1944
      • C:\Users\Admin\AppData\Local\Temp\wivvew.exe
        "C:\Users\Admin\AppData\Local\Temp\wivvew.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1136
      • C:\Users\Admin\AppData\Local\Temp\lvkpze.exe
        "C:\Users\Admin\AppData\Local\Temp\lvkpze.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1100
      • C:\Users\Admin\AppData\Local\Temp\ejznrs.exe
        "C:\Users\Admin\AppData\Local\Temp\ejznrs.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3656
      • C:\Users\Admin\AppData\Local\Temp\hibaix.exe
        "C:\Users\Admin\AppData\Local\Temp\hibaix.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3764
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "hibaix" /tr "C:\Users\Admin\AppData\Roaming\hibaix.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1356
        • C:\Users\Admin\AppData\Local\Temp\vxoyog.exe
          "C:\Users\Admin\AppData\Local\Temp\vxoyog.exe"
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3304
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "vxoyog" /tr "C:\Users\Admin\AppData\Roaming\vxoyog.exe"
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2296
          • C:\Users\Admin\AppData\Local\Temp\hhjwds.exe
            "C:\Users\Admin\AppData\Local\Temp\hhjwds.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3000
          • C:\Users\Admin\AppData\Local\Temp\rhcjdv.exe
            "C:\Users\Admin\AppData\Local\Temp\rhcjdv.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:4320
          • C:\Users\Admin\AppData\Local\Temp\wzbjyi.exe
            "C:\Users\Admin\AppData\Local\Temp\wzbjyi.exe"
            5⤵
            • Executes dropped EXE
            PID:2996
          • C:\Users\Admin\AppData\Local\Temp\cbnmex.exe
            "C:\Users\Admin\AppData\Local\Temp\cbnmex.exe"
            5⤵
              PID:4320
            • C:\Users\Admin\AppData\Local\Temp\pjyvqf.exe
              "C:\Users\Admin\AppData\Local\Temp\pjyvqf.exe"
              5⤵
                PID:924
              • C:\Users\Admin\AppData\Local\Temp\idfxzd.exe
                "C:\Users\Admin\AppData\Local\Temp\idfxzd.exe"
                5⤵
                  PID:1600
                • C:\Users\Admin\AppData\Local\Temp\jnzkxj.exe
                  "C:\Users\Admin\AppData\Local\Temp\jnzkxj.exe"
                  5⤵
                    PID:696
                  • C:\Users\Admin\AppData\Local\Temp\cmxtbg.exe
                    "C:\Users\Admin\AppData\Local\Temp\cmxtbg.exe"
                    5⤵
                      PID:3536
                    • C:\Users\Admin\AppData\Local\Temp\unouom.exe
                      "C:\Users\Admin\AppData\Local\Temp\unouom.exe"
                      5⤵
                        PID:1148
                      • C:\Users\Admin\AppData\Local\Temp\nvclgu.exe
                        "C:\Users\Admin\AppData\Local\Temp\nvclgu.exe"
                        5⤵
                          PID:4804
                        • C:\Users\Admin\AppData\Local\Temp\tvqxbz.exe
                          "C:\Users\Admin\AppData\Local\Temp\tvqxbz.exe"
                          5⤵
                            PID:876
                          • C:\Users\Admin\AppData\Local\Temp\pyzyal.exe
                            "C:\Users\Admin\AppData\Local\Temp\pyzyal.exe"
                            5⤵
                              PID:1600
                            • C:\Users\Admin\AppData\Local\Temp\irdeks.exe
                              "C:\Users\Admin\AppData\Local\Temp\irdeks.exe"
                              5⤵
                                PID:2036
                              • C:\Users\Admin\AppData\Local\Temp\awhsbd.exe
                                "C:\Users\Admin\AppData\Local\Temp\awhsbd.exe"
                                5⤵
                                  PID:4740
                                • C:\Users\Admin\AppData\Local\Temp\qnotje.exe
                                  "C:\Users\Admin\AppData\Local\Temp\qnotje.exe"
                                  5⤵
                                    PID:3148
                                  • C:\Users\Admin\AppData\Local\Temp\axgfrb.exe
                                    "C:\Users\Admin\AppData\Local\Temp\axgfrb.exe"
                                    5⤵
                                      PID:1320
                                    • C:\Users\Admin\AppData\Local\Temp\tekxed.exe
                                      "C:\Users\Admin\AppData\Local\Temp\tekxed.exe"
                                      5⤵
                                        PID:2220
                                      • C:\Users\Admin\AppData\Local\Temp\gvncmx.exe
                                        "C:\Users\Admin\AppData\Local\Temp\gvncmx.exe"
                                        5⤵
                                          PID:4708
                                        • C:\Users\Admin\AppData\Local\Temp\ijlklk.exe
                                          "C:\Users\Admin\AppData\Local\Temp\ijlklk.exe"
                                          5⤵
                                            PID:3168
                                          • C:\Users\Admin\AppData\Local\Temp\mbumhn.exe
                                            "C:\Users\Admin\AppData\Local\Temp\mbumhn.exe"
                                            5⤵
                                              PID:4780
                                            • C:\Users\Admin\AppData\Local\Temp\lwovyc.exe
                                              "C:\Users\Admin\AppData\Local\Temp\lwovyc.exe"
                                              5⤵
                                                PID:32
                                              • C:\Users\Admin\AppData\Local\Temp\fcackf.exe
                                                "C:\Users\Admin\AppData\Local\Temp\fcackf.exe"
                                                5⤵
                                                  PID:5020
                                                • C:\Users\Admin\AppData\Local\Temp\hcrelf.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\hcrelf.exe"
                                                  5⤵
                                                    PID:2108
                                                  • C:\Users\Admin\AppData\Local\Temp\qnbrkz.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\qnbrkz.exe"
                                                    5⤵
                                                      PID:4516
                                                    • C:\Users\Admin\AppData\Local\Temp\spmvsp.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\spmvsp.exe"
                                                      5⤵
                                                        PID:4848
                                                      • C:\Users\Admin\AppData\Local\Temp\ggxxmh.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\ggxxmh.exe"
                                                        5⤵
                                                          PID:2868
                                                      • C:\Users\Admin\AppData\Local\Temp\xlhhat.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\xlhhat.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4684
                                                      • C:\Users\Admin\AppData\Local\Temp\ibfiou.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\ibfiou.exe"
                                                        4⤵
                                                        • Drops startup file
                                                        • Executes dropped EXE
                                                        • Adds Run key to start application
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3696
                                                        • C:\Windows\System32\schtasks.exe
                                                          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "ibfiou" /tr "C:\Users\Admin\AppData\Roaming\ibfiou.exe"
                                                          5⤵
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:3584
                                                        • C:\Users\Admin\AppData\Local\Temp\vyqtaq.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\vyqtaq.exe"
                                                          5⤵
                                                          • Executes dropped EXE
                                                          PID:1580
                                                        • C:\Users\Admin\AppData\Local\Temp\wandzc.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\wandzc.exe"
                                                          5⤵
                                                          • Executes dropped EXE
                                                          PID:4228
                                                        • C:\Users\Admin\AppData\Local\Temp\hfedvw.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\hfedvw.exe"
                                                          5⤵
                                                            PID:3992
                                                          • C:\Users\Admin\AppData\Local\Temp\jcfusg.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\jcfusg.exe"
                                                            5⤵
                                                            • Drops startup file
                                                            • Adds Run key to start application
                                                            PID:3612
                                                            • C:\Windows\System32\schtasks.exe
                                                              "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "jcfusg" /tr "C:\Users\Admin\AppData\Roaming\jcfusg.exe"
                                                              6⤵
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:4688
                                                            • C:\Users\Admin\AppData\Local\Temp\fkfuvc.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\fkfuvc.exe"
                                                              6⤵
                                                                PID:2296
                                                              • C:\Users\Admin\AppData\Local\Temp\jctsxq.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\jctsxq.exe"
                                                                6⤵
                                                                  PID:2404
                                                                • C:\Users\Admin\AppData\Local\Temp\cjrndi.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\cjrndi.exe"
                                                                  6⤵
                                                                    PID:916
                                                                  • C:\Users\Admin\AppData\Local\Temp\vzfzua.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\vzfzua.exe"
                                                                    6⤵
                                                                      PID:808
                                                                    • C:\Users\Admin\AppData\Local\Temp\ufgiqi.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\ufgiqi.exe"
                                                                      6⤵
                                                                        PID:32
                                                                      • C:\Users\Admin\AppData\Local\Temp\udxcrw.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\udxcrw.exe"
                                                                        6⤵
                                                                          PID:220
                                                                        • C:\Users\Admin\AppData\Local\Temp\wypdxw.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\wypdxw.exe"
                                                                          6⤵
                                                                          • Drops startup file
                                                                          • Adds Run key to start application
                                                                          PID:2320
                                                                          • C:\Windows\System32\schtasks.exe
                                                                            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "wypdxw" /tr "C:\Users\Admin\AppData\Roaming\wypdxw.exe"
                                                                            7⤵
                                                                            • Scheduled Task/Job: Scheduled Task
                                                                            PID:3588
                                                                          • C:\Users\Admin\AppData\Local\Temp\onppom.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\onppom.exe"
                                                                            7⤵
                                                                            • Drops startup file
                                                                            • Adds Run key to start application
                                                                            PID:3312
                                                                            • C:\Windows\System32\schtasks.exe
                                                                              "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "onppom" /tr "C:\Users\Admin\AppData\Roaming\onppom.exe"
                                                                              8⤵
                                                                              • Scheduled Task/Job: Scheduled Task
                                                                              PID:4940
                                                                            • C:\Users\Admin\AppData\Local\Temp\kcbzsc.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\kcbzsc.exe"
                                                                              8⤵
                                                                                PID:3100
                                                                              • C:\Users\Admin\AppData\Local\Temp\wiapzr.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\wiapzr.exe"
                                                                                8⤵
                                                                                  PID:2500
                                                                                • C:\Users\Admin\AppData\Local\Temp\ymijna.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\ymijna.exe"
                                                                                  8⤵
                                                                                    PID:3740
                                                                                  • C:\Users\Admin\AppData\Local\Temp\djepxy.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\djepxy.exe"
                                                                                    8⤵
                                                                                      PID:4932
                                                                                    • C:\Users\Admin\AppData\Local\Temp\rbrgij.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\rbrgij.exe"
                                                                                      8⤵
                                                                                        PID:2424
                                                                                      • C:\Users\Admin\AppData\Local\Temp\guynxz.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\guynxz.exe"
                                                                                        8⤵
                                                                                          PID:1016
                                                                                      • C:\Users\Admin\AppData\Local\Temp\vgqjqb.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\vgqjqb.exe"
                                                                                        7⤵
                                                                                          PID:4740
                                                                                        • C:\Users\Admin\AppData\Local\Temp\qjrfbj.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\qjrfbj.exe"
                                                                                          7⤵
                                                                                            PID:4312
                                                                                          • C:\Users\Admin\AppData\Local\Temp\dwmswa.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\dwmswa.exe"
                                                                                            7⤵
                                                                                            • Drops startup file
                                                                                            • Adds Run key to start application
                                                                                            PID:5024
                                                                                            • C:\Windows\System32\schtasks.exe
                                                                                              "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "dwmswa" /tr "C:\Users\Admin\AppData\Roaming\dwmswa.exe"
                                                                                              8⤵
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:4080
                                                                                            • C:\Users\Admin\AppData\Local\Temp\jackxl.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\jackxl.exe"
                                                                                              8⤵
                                                                                                PID:5048
                                                                                              • C:\Users\Admin\AppData\Local\Temp\svqupu.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\svqupu.exe"
                                                                                                8⤵
                                                                                                  PID:3136
                                                                                                • C:\Users\Admin\AppData\Local\Temp\tsinlq.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\tsinlq.exe"
                                                                                                  8⤵
                                                                                                    PID:3172
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\wubwig.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\wubwig.exe"
                                                                                                    8⤵
                                                                                                      PID:1220
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\hvdnij.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\hvdnij.exe"
                                                                                                    7⤵
                                                                                                      PID:4588
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\ubgybm.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\ubgybm.exe"
                                                                                                      7⤵
                                                                                                        PID:32
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\hupnll.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\hupnll.exe"
                                                                                                        7⤵
                                                                                                          PID:3600
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\xbzsdw.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\xbzsdw.exe"
                                                                                                          7⤵
                                                                                                            PID:3596
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\xfqunk.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\xfqunk.exe"
                                                                                                            7⤵
                                                                                                              PID:3444
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\nighpg.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\nighpg.exe"
                                                                                                            6⤵
                                                                                                              PID:3724
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\jnszlu.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\jnszlu.exe"
                                                                                                              6⤵
                                                                                                                PID:3744
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\bgpeap.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\bgpeap.exe"
                                                                                                                6⤵
                                                                                                                  PID:2028
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\wamlxu.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\wamlxu.exe"
                                                                                                                  6⤵
                                                                                                                    PID:3744
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tarvqe.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\tarvqe.exe"
                                                                                                                    6⤵
                                                                                                                      PID:4624
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\tsbjlm.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\tsbjlm.exe"
                                                                                                                      6⤵
                                                                                                                        PID:2240
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\umpzzc.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\umpzzc.exe"
                                                                                                                        6⤵
                                                                                                                          PID:5032
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\qvrdal.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\qvrdal.exe"
                                                                                                                          6⤵
                                                                                                                            PID:4840
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\gsyzhw.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\gsyzhw.exe"
                                                                                                                            6⤵
                                                                                                                              PID:2672
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\jckmop.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\jckmop.exe"
                                                                                                                              6⤵
                                                                                                                                PID:4220
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\powngt.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\powngt.exe"
                                                                                                                                6⤵
                                                                                                                                  PID:3724
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ikgttz.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ikgttz.exe"
                                                                                                                                5⤵
                                                                                                                                  PID:1928
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\onivnn.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\onivnn.exe"
                                                                                                                                  5⤵
                                                                                                                                    PID:1952
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\lixvgj.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\lixvgj.exe"
                                                                                                                                    5⤵
                                                                                                                                      PID:424
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\jwxxqr.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\jwxxqr.exe"
                                                                                                                                      5⤵
                                                                                                                                        PID:3124
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\bgvhzl.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\bgvhzl.exe"
                                                                                                                                        5⤵
                                                                                                                                          PID:2604
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\gbfkkq.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\gbfkkq.exe"
                                                                                                                                          5⤵
                                                                                                                                            PID:1476
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\kdhnom.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\kdhnom.exe"
                                                                                                                                            5⤵
                                                                                                                                              PID:2564
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ulrrsn.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\ulrrsn.exe"
                                                                                                                                              5⤵
                                                                                                                                                PID:984
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\yovwlw.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\yovwlw.exe"
                                                                                                                                                5⤵
                                                                                                                                                  PID:4804
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\iktprn.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\iktprn.exe"
                                                                                                                                                  5⤵
                                                                                                                                                    PID:3136
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\egnxpl.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\egnxpl.exe"
                                                                                                                                                    5⤵
                                                                                                                                                      PID:4936
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\hbxhld.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\hbxhld.exe"
                                                                                                                                                      5⤵
                                                                                                                                                        PID:800
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\cvhldf.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\cvhldf.exe"
                                                                                                                                                        5⤵
                                                                                                                                                          PID:2492
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\zkohjk.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\zkohjk.exe"
                                                                                                                                                          5⤵
                                                                                                                                                            PID:5064
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\pjqjba.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\pjqjba.exe"
                                                                                                                                                            5⤵
                                                                                                                                                              PID:4516
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\xumtjh.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\xumtjh.exe"
                                                                                                                                                              5⤵
                                                                                                                                                                PID:3472
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ywwgjq.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ywwgjq.exe"
                                                                                                                                                                5⤵
                                                                                                                                                                  PID:1428
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\pqcsup.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\pqcsup.exe"
                                                                                                                                                                  5⤵
                                                                                                                                                                    PID:4148
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\pxhoqg.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\pxhoqg.exe"
                                                                                                                                                                    5⤵
                                                                                                                                                                      PID:3728
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\zwxdhf.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\zwxdhf.exe"
                                                                                                                                                                      5⤵
                                                                                                                                                                        PID:4348
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\gzzote.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\gzzote.exe"
                                                                                                                                                                      4⤵
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                      PID:4840
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\dnkpnb.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\dnkpnb.exe"
                                                                                                                                                                      4⤵
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      PID:2564
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\dcmuyq.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\dcmuyq.exe"
                                                                                                                                                                      4⤵
                                                                                                                                                                        PID:4760
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\zrbsys.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\zrbsys.exe"
                                                                                                                                                                        4⤵
                                                                                                                                                                          PID:2292
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\dxzqnv.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\dxzqnv.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                            PID:1028
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\mipxqk.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\mipxqk.exe"
                                                                                                                                                                            4⤵
                                                                                                                                                                              PID:3368
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\vhdjua.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\vhdjua.exe"
                                                                                                                                                                              4⤵
                                                                                                                                                                                PID:4004
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vixgex.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\vixgex.exe"
                                                                                                                                                                                4⤵
                                                                                                                                                                                  PID:3524
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\hodoix.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\hodoix.exe"
                                                                                                                                                                                  4⤵
                                                                                                                                                                                    PID:1152
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tnahlw.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\tnahlw.exe"
                                                                                                                                                                                    4⤵
                                                                                                                                                                                      PID:3560
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\fmaoce.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\fmaoce.exe"
                                                                                                                                                                                      4⤵
                                                                                                                                                                                        PID:3964
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\lflbyq.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\lflbyq.exe"
                                                                                                                                                                                        4⤵
                                                                                                                                                                                          PID:3260
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\nqwawq.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\nqwawq.exe"
                                                                                                                                                                                          4⤵
                                                                                                                                                                                            PID:4496
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\uxsbjz.exe
                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\uxsbjz.exe"
                                                                                                                                                                                            4⤵
                                                                                                                                                                                              PID:4436
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\sxzsed.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\sxzsed.exe"
                                                                                                                                                                                              4⤵
                                                                                                                                                                                                PID:2772
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\jnwhdi.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\jnwhdi.exe"
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                  PID:2532
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ahftuy.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ahftuy.exe"
                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                    PID:928
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\lfpmbs.exe
                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\lfpmbs.exe"
                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                      PID:1600
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\asrkmn.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\asrkmn.exe"
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                        PID:4684
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\ddcbwe.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\ddcbwe.exe"
                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                          PID:2256
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\fsaisk.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\fsaisk.exe"
                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                            PID:3292
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ufnnap.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ufnnap.exe"
                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                              PID:2028
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\kbcuqe.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\kbcuqe.exe"
                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                PID:1352
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\jfwhsm.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\jfwhsm.exe"
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                  PID:3492
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\lzaiez.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\lzaiez.exe"
                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                    PID:3836
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\zxishb.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\zxishb.exe"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                  PID:4348
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\xcuxon.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\xcuxon.exe"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                  PID:3020
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\wgbttj.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\wgbttj.exe"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                  PID:2424
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\hzumnv.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\hzumnv.exe"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                  PID:2520
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\zacenu.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\zacenu.exe"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                  PID:1136
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\pvaxvg.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\pvaxvg.exe"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                  PID:3172
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\otnjsx.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\otnjsx.exe"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  PID:1972
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\khvmql.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\khvmql.exe"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                    PID:4080
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\qoorti.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\qoorti.exe"
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                      PID:3448
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\dnkmsh.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\dnkmsh.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:2340
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\ysoahs.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\ysoahs.exe"
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:2668
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\mykuea.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\mykuea.exe"
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                            PID:2328
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\wyhwcf.exe
                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\wyhwcf.exe"
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                              PID:2940
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\amkroz.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\amkroz.exe"
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                PID:2976
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\fycrui.exe
                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\fycrui.exe"
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                  PID:3452
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\wbbgka.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\wbbgka.exe"
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                    PID:3136
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\jjzczr.exe
                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\jjzczr.exe"
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                      PID:2572
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\avjovu.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\avjovu.exe"
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                        PID:4780
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\bhlflf.exe
                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\bhlflf.exe"
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                          PID:2880
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\wgepvj.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\wgepvj.exe"
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                            PID:4356
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\pvebyc.exe
                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\pvebyc.exe"
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                              PID:2036
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\zpngns.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\zpngns.exe"
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:4896
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\fxmtqs.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\fxmtqs.exe"
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                  PID:3000
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\pqcipn.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\pqcipn.exe"
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                    PID:684
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\xrqvke.exe
                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\xrqvke.exe"
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                      PID:4984
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\wtnqne.exe
                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\wtnqne.exe"
                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                        PID:3036
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\myxgpg.exe
                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\myxgpg.exe"
                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                        • Drops startup file
                                                                                                                                                                                                                                                        • Adds Run key to start application
                                                                                                                                                                                                                                                        PID:2976
                                                                                                                                                                                                                                                        • C:\Windows\System32\schtasks.exe
                                                                                                                                                                                                                                                          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "myxgpg" /tr "C:\Users\Admin\AppData\Roaming\myxgpg.exe"
                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                          PID:4764
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\gutszn.exe
                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\gutszn.exe"
                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                          PID:244
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\scqlze.exe
                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\scqlze.exe"
                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                            PID:228
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ghfreh.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ghfreh.exe"
                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                              PID:3924
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\cttgdv.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\cttgdv.exe"
                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                            PID:1224
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\hnwaka.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\hnwaka.exe"
                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                            PID:2488
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\yquaib.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\yquaib.exe"
                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                            PID:3336
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\qdutgz.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\qdutgz.exe"
                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                            PID:2424
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ptuqbi.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ptuqbi.exe"
                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                            PID:740
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ezqpwy.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ezqpwy.exe"
                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                            PID:3904
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\sxarcg.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\sxarcg.exe"
                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                            PID:2984
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tthags.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\tthags.exe"
                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                            PID:4612
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ruzrvp.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ruzrvp.exe"
                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                            PID:4076
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ginuqj.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ginuqj.exe"
                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                            PID:1356
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\bqlnvk.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\bqlnvk.exe"
                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                            PID:3608
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\jjtvhl.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\jjtvhl.exe"
                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                            PID:5048
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ayaoam.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ayaoam.exe"
                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                              PID:808
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\spmczg.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\spmczg.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                PID:4236
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\jneain.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\jneain.exe"
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                  PID:4084
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\lyhrqm.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\lyhrqm.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                    PID:2836
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ufywrx.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\ufywrx.exe"
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                      PID:3828
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\yvnoqw.exe
                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\yvnoqw.exe"
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                        PID:4128
                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\psiacb.exe
                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\psiacb.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                          PID:2280
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\wyqfei.exe
                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\wyqfei.exe"
                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                            PID:4512
                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\gjagkj.exe
                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\gjagkj.exe"
                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                              PID:3040
                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\djiotu.exe
                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\djiotu.exe"
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                PID:1648
                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ovxpde.exe
                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ovxpde.exe"
                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                  PID:2056
                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tvxhlq.exe
                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\tvxhlq.exe"
                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                    PID:2328
                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ekvgur.exe
                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\ekvgur.exe"
                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                      PID:804
                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\vpapqh.exe
                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\vpapqh.exe"
                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                        PID:1664
                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\wrkekg.exe
                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\wrkekg.exe"
                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                          PID:3732
                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\oayolg.exe
                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\oayolg.exe"
                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                            PID:2368
                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\dhumlj.exe
                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\dhumlj.exe"
                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                              PID:4144
                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\lzxkcz.exe
                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\lzxkcz.exe"
                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                PID:5040
                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\nxpqse.exe
                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\nxpqse.exe"
                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                  PID:396
                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\uyfptm.exe
                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\uyfptm.exe"
                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                    PID:3048
                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tokqtl.exe
                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\tokqtl.exe"
                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                      PID:3444
                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\rqzocm.exe
                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\rqzocm.exe"
                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                        PID:1948
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\xjdqer.exe
                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\xjdqer.exe"
                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                          PID:2628
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                        PID:1944
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                        PID:2240
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                        PID:4364
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                        PID:3296
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\uhtmta.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\uhtmta.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                        PID:2812
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                        PID:1736
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                        PID:3488
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\uhtmta.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\uhtmta.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                        PID:3144
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\hibaix.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\hibaix.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                        PID:4996
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                        PID:4004
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\vxoyog.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\vxoyog.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                        PID:948
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                        PID:3760
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\uhtmta.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\uhtmta.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                        PID:1312
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\hibaix.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\hibaix.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                        PID:3476
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                        PID:4572
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\vxoyog.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\vxoyog.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                        PID:3164
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                        PID:244
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\uhtmta.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\uhtmta.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                        PID:4604
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\hibaix.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\hibaix.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                        PID:4464
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                        PID:2884
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\ibfiou.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\ibfiou.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                        PID:4136
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\vxoyog.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\vxoyog.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                        PID:4932
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                        PID:1472
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\uhtmta.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\uhtmta.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        PID:344
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\hibaix.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\hibaix.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        PID:2076
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        PID:1228
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\ibfiou.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\ibfiou.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        PID:2664
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\jcfusg.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\jcfusg.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                          PID:2412
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\vxoyog.exe
                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\vxoyog.exe
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                            PID:2724
                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                              PID:1792
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\uhtmta.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\uhtmta.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                PID:2708
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\hibaix.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\hibaix.exe
                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                  PID:4436
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                    PID:2540
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\ibfiou.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\ibfiou.exe
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                      PID:4632
                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\jcfusg.exe
                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\jcfusg.exe
                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                        PID:1224
                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\vxoyog.exe
                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\vxoyog.exe
                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                          PID:4740
                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                            PID:424
                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\uhtmta.exe
                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\uhtmta.exe
                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                              PID:3164
                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\hibaix.exe
                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\hibaix.exe
                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                PID:5068
                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                  PID:4760
                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\ibfiou.exe
                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\ibfiou.exe
                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                    PID:3904
                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\jcfusg.exe
                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\jcfusg.exe
                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                      PID:2672
                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\vxoyog.exe
                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\vxoyog.exe
                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                        PID:4804
                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\wypdxw.exe
                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\wypdxw.exe
                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                          PID:2540
                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                            PID:2424
                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\uhtmta.exe
                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\uhtmta.exe
                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                              PID:4880
                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\hibaix.exe
                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\hibaix.exe
                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                PID:4076
                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                  PID:2976
                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\ibfiou.exe
                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\ibfiou.exe
                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                    PID:4736
                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\jcfusg.exe
                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\jcfusg.exe
                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                      PID:3472
                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\vxoyog.exe
                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\vxoyog.exe
                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                        PID:1532
                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                          PID:3536
                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\wypdxw.exe
                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\wypdxw.exe
                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                            PID:4724
                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\uhtmta.exe
                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\uhtmta.exe
                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                              PID:1152
                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\hibaix.exe
                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\hibaix.exe
                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                PID:4436
                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\onppom.exe
                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\onppom.exe
                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                  PID:884
                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                    PID:3148
                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\ibfiou.exe
                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\ibfiou.exe
                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                      PID:5080
                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\ibfiou.exe
                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\ibfiou.exe
                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                        PID:4240
                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\dwmswa.exe
                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\dwmswa.exe
                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                          PID:2772
                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\jcfusg.exe
                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\jcfusg.exe
                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                            PID:4144
                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\vxoyog.exe
                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\vxoyog.exe
                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                              PID:1836
                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\wypdxw.exe
                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\wypdxw.exe
                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                PID:4356
                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                  PID:4576
                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\uhtmta.exe
                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\uhtmta.exe
                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                    PID:4880
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\hibaix.exe
                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\hibaix.exe
                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                      PID:1472
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\onppom.exe
                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\onppom.exe
                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                        PID:2108
                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                          PID:4236
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\ibfiou.exe
                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\ibfiou.exe
                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                            PID:3492
                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\dwmswa.exe
                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\dwmswa.exe
                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                              PID:1604
                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\jcfusg.exe
                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\jcfusg.exe
                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                PID:476
                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\vxoyog.exe
                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\vxoyog.exe
                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                  PID:1528
                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\wypdxw.exe
                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\wypdxw.exe
                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                    PID:3844
                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                      PID:4988
                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\uhtmta.exe
                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\uhtmta.exe
                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                        PID:4668
                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\hibaix.exe
                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\hibaix.exe
                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                          PID:1148
                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\onppom.exe
                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\onppom.exe
                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                            PID:1040
                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                              PID:960
                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\myxgpg.exe
                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\myxgpg.exe
                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                PID:4660
                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\ibfiou.exe
                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\ibfiou.exe
                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                  PID:4916
                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\dwmswa.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\dwmswa.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                    PID:3964
                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\jcfusg.exe
                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\jcfusg.exe
                                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:5012
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\vxoyog.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\vxoyog.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                        PID:4848
                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                          PID:2264
                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\wypdxw.exe
                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\wypdxw.exe
                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                            PID:4736
                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\uhtmta.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\uhtmta.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                              PID:4352
                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\hibaix.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\hibaix.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                PID:1956
                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\onppom.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\onppom.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3732
                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:4668
                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\myxgpg.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\myxgpg.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:4684
                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\ibfiou.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\ibfiou.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:3904
                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\dwmswa.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\dwmswa.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:4708
                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\jcfusg.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\jcfusg.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:2068
                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\vxoyog.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\vxoyog.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:2696
                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\ljqysm.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:224
                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\wypdxw.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\wypdxw.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:2020
                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\uhtmta.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\uhtmta.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:1604
                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\hibaix.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\hibaix.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:3156
                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\onppom.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\onppom.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:8
                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:800
                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\myxgpg.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\myxgpg.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:4576

                                                                                                                                                                                                                                                                                                                                                                                                                                                          Network

                                                                                                                                                                                                                                                                                                                                                                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                                                                                                                                                                          Replay Monitor

                                                                                                                                                                                                                                                                                                                                                                                                                                                          Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                                                                                                                                                                          Downloads

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\15415145.exe.log

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            654B

                                                                                                                                                                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                            2cbbb74b7da1f720b48ed31085cbd5b8

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                            79caa9a3ea8abe1b9c4326c3633da64a5f724964

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                            e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                            ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            2KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                            627073ee3ca9676911bee35548eff2b8

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4c4b68c65e2cab9864b51167d710aa29ebdcff2e

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                            85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                            3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            944B

                                                                                                                                                                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                            1a9fa92a4f2e2ec9e244d43a6a4f8fb9

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                            9910190edfaccece1dfcc1d92e357772f5dae8f7

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                            0ee052d5333fd5fd86bc84856fec98e045f077a7ac8051651bf7c521b9706888

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                            5d2361476fa22200e6f83883efe7dcb8c3fe7dae8d56e04e28a36e9ae1270c327b6aa161d92b239593da7661289d002c574446ecfd6bd19928209aae25e3ef64

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            944B

                                                                                                                                                                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                            2e0391d00f5bfbc34be70790f14d5edf

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                            fcb04d8599c23967de4f154a101be480933ab0d0

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                            1c0c0c86d7c736fc9fb148ac7cd6e67565dc5b76fa116ae3b000a79e91855136

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                            231b9cc6efb928f0748cef04f287d9204c4f7d2eb4bc27f345e9a1afc6d0675057978ca44d1a95334ee2380709aa6dbe74015fedff8f17611a64efcfb9f64d2a

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_f0zfnean.xx1.ps1

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            60B

                                                                                                                                                                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\dwmswa.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            159KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                            c73cfd1942fdfaf5d6f3940ca42bbadd

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                            9c9424953c85d03daf296d7841577228d15e1884

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                            3d735b082f087b25561d293d17a6cda64326f3d48c1db53a2941ded1afc78773

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                            9d7ce397b67e704773f7a9ea6c9cd1e5345f2211a67ac5dd5f622118690ed295a18e763c47e5c208240f71d4bedb67ba1e869faff466602f8e97350f9df9495c

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\hibaix.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            166KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                            7a7586c1278ecdb7881a3b34f841b722

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                            8c991bb42729a7e34a096f9d3b23e7e0a25329a8

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                            e2e527d70759106b6d1f479d0a1edd99d9b57c7fdfde2fffd1705e2161438a7f

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                            79ddd9f08587767ab6b2b66fa7873b0de9a51b8ee52abe8b9ed7e7cf9c42ddd3e45069e978bde40e1708c44a7d8c6a5c271e1dd7129501227dcd8dc5477872b2

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ibfiou.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            152KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                            c0a4054bc0a6553d3a246d91e6cdc95b

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                            b8722a0cf5483539ce965098fb299ad129d1a36b

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                            0c20402e4957de72ae5e6c5ce00d0dfab6a49affb260996b3290d44264977909

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                            5f5e88e876e6363992cd28794203874d27fc204bc7df004d32bfa18ebd0797c8c89ccb6b4cc44d4bdf6a9b476d5be5bec2a91bdc7020ba7b3628b98c9587ea5e

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\jcfusg.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            151KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                            5cdc9671612660bd34747c635218a649

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                            8cebfbdfc27689d9988d4512da7d855c13eb8e0b

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                            119b3e5a0b2aad4dc9a6a7376dde77e80826830a24a08aefd858710e79a11db9

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                            a33bfb9c9db6469274a38bee8038fa7a86b2e336e48776bee788b7b2b372556b5880253cdc7856339130ca8b29c199a739020e78ca29cc401f441e2ac18280ef

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ljqysm.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            34KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                            950d739da650457fab6a225545794238

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                            e965286161ecda1b8c0072d8a2d80c191bb15705

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                            a571fcac5384158c4927e7c7cf07182b68eccf67845ba927beae44cd9835e3f8

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                            b7b91343176c5a7f6408b21fbc96c23d0b02c080b846e29f304ba91de1d0f37a772953e7ab65d1d627cb3490fbef3b85681564e878d8dcda57c0897dbad1d19b

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\myxgpg.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            158KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                            eccccd69bbde41339441e5278f21bc10

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                            d1d96bfea61f93c10064417f3682bcebd682a7ad

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                            69074dfb9990c949ae7238d95ff74d2cd294e54759ee1f087519aec081098541

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                            edb20574c49e7495eef969113f3a38979b8ef85669da30de4c0e0632ea2467fc3e11ef62686e32b5c90d29e99abc66d5cdc97d5bc420f356eb04b72e71553dea

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\onppom.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            161KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                            760aa2ef40d31c55f0019cc916e9de48

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                            0228e46ca0a0303bebf54a65bf5da8111c4de402

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                            7ae58db4879d8daf291c5eab58ca9b49bc1b5c63153a02d175d83406a71a2806

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                            ce85a4af522b22d696ff98e176e2f97280363ac5e4161e39dac8cb0404af8d20fc4efe0ddd9e39cfa07bef28b65960c9a56822c6436b715f37ec6df9bd512d04

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\uhtmta.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            159KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                            49a6b6e8627762b929999b0b1fe6d604

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4a47bbb17c6cbda79794428df97d203b7261af79

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                            ca6aa52d419303376de2c37b4c8f6bdd41e31e55de6d178520ad5056303b6571

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                            c967dcb9be6b1fa73f1ef50a7785c17919365857be63923c6cad53362931d9a1c9fb41a43d68a050ad2a50239580fc8294e61e2ba10ee19d185f4f91c035b85b

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vxoyog.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            156KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                            e2cf7cb958bda8d948e80bdb78d6e283

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                            34c18cf619966914046b7a8f9070b0ee9ca0523d

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                            07f878b812dc294a61fb6030dffab309e4a05bef322759a198f110aa88c3b402

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                            3197a3a08069a2a33cea248503132dff4369efe6b83d13db61ef5be81e26f5c3f57ecba9c31e73754f321848dcf491f19eb0249f5f182c2332ae0879ed84b56c

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vyqtaq.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            30KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                            d8a05fae946f16dbb12d5489f2b68230

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                            f8068ceb85905539ed39dc4dc187088487b09e17

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                            7876b3d0721a40d4d80f873be9ff79e722e28bd24ba0ee9ab9faac5c7aa69899

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                            661fc778e40c260756d928fe3bed91c3cbc8884ac27a071e1bf3c8f97c9133bd4bd853371baed477a3988305c12e1c405d03059f8652d810a23eb6050f6ade77

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\wypdxw.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            161KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                            a2e166ef9ba63b78150b9e08767d0764

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                            885c223c8436ee6184f6335f3bcf7bd761e85319

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                            0626693b0820897af0b56b9092439ce955a2435b610127d1686ea256eddc230f

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                            04651a2f9f4d648b95e7a5e67a1e1ddbaa12d8d2d1fecbf2da956b58826ad2f0aee2b1e182b1beab3f73215185f7c402df67fed4e0bcf401a2eea64ec34c627b

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\15415145.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            59KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                            6c091ad6fae0fa76f44870d1a1b05cb4

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                            040f60c0ee3f4902f919025057e34ab4d11b1abd

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                            c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                            3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1580-482-0x0000000000650000-0x000000000065E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1944-17-0x00007FFA7ECB0000-0x00007FFA7F772000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1944-15-0x00007FFA7ECB0000-0x00007FFA7F772000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2160-37-0x0000022A2C980000-0x0000022A2C9A2000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            136KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2320-1152-0x0000000000C60000-0x0000000000C8E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2976-1730-0x0000000000C00000-0x0000000000C2E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/3304-313-0x0000000000370000-0x000000000039E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/3312-1342-0x0000000000370000-0x000000000039E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/3320-112-0x0000000000FC0000-0x0000000000FEE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/3612-630-0x0000000000BB0000-0x0000000000BDC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/3696-391-0x0000000000A50000-0x0000000000A7C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/3764-224-0x0000000000550000-0x0000000000580000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/4584-12-0x00007FFA7ECB0000-0x00007FFA7F772000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/4584-0-0x00007FFA7ECB3000-0x00007FFA7ECB5000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/4584-11-0x00007FFA7ECB3000-0x00007FFA7ECB5000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/4584-1-0x00000000007C0000-0x00000000007D6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/4584-10-0x00007FFA7ECB0000-0x00007FFA7F772000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/4964-30-0x0000000000E20000-0x0000000000E2E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/4964-299-0x00000000016E0000-0x00000000016EA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            40KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/5024-1561-0x0000000000980000-0x00000000009AE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            184KB