Analysis

  • max time kernel
    898s
  • max time network
    905s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250218-en
  • resource tags

    arch:x64arch:x86image:win11-20250218-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06/03/2025, 18:11

General

  • Target

    15415145.exe

  • Size

    59KB

  • MD5

    6c091ad6fae0fa76f44870d1a1b05cb4

  • SHA1

    040f60c0ee3f4902f919025057e34ab4d11b1abd

  • SHA256

    c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

  • SHA512

    3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

  • SSDEEP

    1536:skyZtyUQ8sBkROLW+UzbTH3gfm2qt0OgSko7:skItfQ8sBkROUzbTQf+6OgK7

Malware Config

Extracted

Family

xworm

Version

3.1

C2

known-savage.gl.at.ply.gg:45116

association-lectures.gl.at.ply.gg:32463

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain
aes.plain

Signatures

  • Detect Xworm Payload 24 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 22 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\15415145.exe
    "C:\Users\Admin\AppData\Local\Temp\15415145.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "15415145" /tr "C:\Users\Admin\AppData\Roaming\15415145.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:3884
    • C:\Users\Admin\AppData\Local\Temp\qsuzkk.exe
      "C:\Users\Admin\AppData\Local\Temp\qsuzkk.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4784
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\qsuzkk.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:396
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'qsuzkk.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4736
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\qsuzkk.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4016
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "qsuzkk" /tr "C:\Users\Admin\AppData\Roaming\qsuzkk.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:664
    • C:\Users\Admin\AppData\Local\Temp\mkqeuy.exe
      "C:\Users\Admin\AppData\Local\Temp\mkqeuy.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1436
    • C:\Users\Admin\AppData\Local\Temp\ucvxjb.exe
      "C:\Users\Admin\AppData\Local\Temp\ucvxjb.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4632
    • C:\Users\Admin\AppData\Local\Temp\ktflyd.exe
      "C:\Users\Admin\AppData\Local\Temp\ktflyd.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1324
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "ktflyd" /tr "C:\Users\Admin\AppData\Roaming\ktflyd.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:112
      • C:\Users\Admin\AppData\Local\Temp\ijftyh.exe
        "C:\Users\Admin\AppData\Local\Temp\ijftyh.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2312
      • C:\Users\Admin\AppData\Local\Temp\cjxdgd.exe
        "C:\Users\Admin\AppData\Local\Temp\cjxdgd.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2304
      • C:\Users\Admin\AppData\Local\Temp\iekmog.exe
        "C:\Users\Admin\AppData\Local\Temp\iekmog.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1920
      • C:\Users\Admin\AppData\Local\Temp\ygwice.exe
        "C:\Users\Admin\AppData\Local\Temp\ygwice.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1436
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "ygwice" /tr "C:\Users\Admin\AppData\Roaming\ygwice.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:5076
        • C:\Users\Admin\AppData\Local\Temp\eeicgz.exe
          "C:\Users\Admin\AppData\Local\Temp\eeicgz.exe"
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3348
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "eeicgz" /tr "C:\Users\Admin\AppData\Roaming\eeicgz.exe"
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:3156
          • C:\Users\Admin\AppData\Local\Temp\hkpoqa.exe
            "C:\Users\Admin\AppData\Local\Temp\hkpoqa.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:460
          • C:\Users\Admin\AppData\Local\Temp\qbfete.exe
            "C:\Users\Admin\AppData\Local\Temp\qbfete.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:4772
          • C:\Users\Admin\AppData\Local\Temp\yphcdi.exe
            "C:\Users\Admin\AppData\Local\Temp\yphcdi.exe"
            5⤵
            • Executes dropped EXE
            PID:1576
          • C:\Users\Admin\AppData\Local\Temp\lzjddt.exe
            "C:\Users\Admin\AppData\Local\Temp\lzjddt.exe"
            5⤵
              PID:2156
            • C:\Users\Admin\AppData\Local\Temp\ezpzcr.exe
              "C:\Users\Admin\AppData\Local\Temp\ezpzcr.exe"
              5⤵
                PID:3968
              • C:\Users\Admin\AppData\Local\Temp\iotdue.exe
                "C:\Users\Admin\AppData\Local\Temp\iotdue.exe"
                5⤵
                  PID:4660
                • C:\Users\Admin\AppData\Local\Temp\pjkffg.exe
                  "C:\Users\Admin\AppData\Local\Temp\pjkffg.exe"
                  5⤵
                    PID:872
                  • C:\Users\Admin\AppData\Local\Temp\vksmce.exe
                    "C:\Users\Admin\AppData\Local\Temp\vksmce.exe"
                    5⤵
                      PID:1100
                    • C:\Users\Admin\AppData\Local\Temp\saskjh.exe
                      "C:\Users\Admin\AppData\Local\Temp\saskjh.exe"
                      5⤵
                        PID:4808
                      • C:\Users\Admin\AppData\Local\Temp\idgwkr.exe
                        "C:\Users\Admin\AppData\Local\Temp\idgwkr.exe"
                        5⤵
                          PID:2364
                        • C:\Users\Admin\AppData\Local\Temp\kqyowe.exe
                          "C:\Users\Admin\AppData\Local\Temp\kqyowe.exe"
                          5⤵
                            PID:1812
                          • C:\Users\Admin\AppData\Local\Temp\kuvdmu.exe
                            "C:\Users\Admin\AppData\Local\Temp\kuvdmu.exe"
                            5⤵
                              PID:2944
                            • C:\Users\Admin\AppData\Local\Temp\ygucit.exe
                              "C:\Users\Admin\AppData\Local\Temp\ygucit.exe"
                              5⤵
                                PID:4808
                              • C:\Users\Admin\AppData\Local\Temp\brwkgc.exe
                                "C:\Users\Admin\AppData\Local\Temp\brwkgc.exe"
                                5⤵
                                  PID:3344
                                • C:\Users\Admin\AppData\Local\Temp\yxflvq.exe
                                  "C:\Users\Admin\AppData\Local\Temp\yxflvq.exe"
                                  5⤵
                                    PID:4984
                                  • C:\Users\Admin\AppData\Local\Temp\xtzsuo.exe
                                    "C:\Users\Admin\AppData\Local\Temp\xtzsuo.exe"
                                    5⤵
                                      PID:2736
                                    • C:\Users\Admin\AppData\Local\Temp\hgonbi.exe
                                      "C:\Users\Admin\AppData\Local\Temp\hgonbi.exe"
                                      5⤵
                                        PID:2636
                                      • C:\Users\Admin\AppData\Local\Temp\jonymc.exe
                                        "C:\Users\Admin\AppData\Local\Temp\jonymc.exe"
                                        5⤵
                                          PID:3452
                                        • C:\Users\Admin\AppData\Local\Temp\nfunus.exe
                                          "C:\Users\Admin\AppData\Local\Temp\nfunus.exe"
                                          5⤵
                                            PID:4048
                                          • C:\Users\Admin\AppData\Local\Temp\vzjwpz.exe
                                            "C:\Users\Admin\AppData\Local\Temp\vzjwpz.exe"
                                            5⤵
                                              PID:2448
                                            • C:\Users\Admin\AppData\Local\Temp\zzyegt.exe
                                              "C:\Users\Admin\AppData\Local\Temp\zzyegt.exe"
                                              5⤵
                                                PID:3156
                                              • C:\Users\Admin\AppData\Local\Temp\ufmfvb.exe
                                                "C:\Users\Admin\AppData\Local\Temp\ufmfvb.exe"
                                                5⤵
                                                  PID:4376
                                                • C:\Users\Admin\AppData\Local\Temp\eoqobr.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\eoqobr.exe"
                                                  5⤵
                                                    PID:3956
                                                  • C:\Users\Admin\AppData\Local\Temp\oakdyq.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\oakdyq.exe"
                                                    5⤵
                                                      PID:4512
                                                    • C:\Users\Admin\AppData\Local\Temp\wkzhxu.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\wkzhxu.exe"
                                                      5⤵
                                                        PID:1512
                                                      • C:\Users\Admin\AppData\Local\Temp\elrpoc.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\elrpoc.exe"
                                                        5⤵
                                                          PID:1000
                                                      • C:\Users\Admin\AppData\Local\Temp\maoeqp.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\maoeqp.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:724
                                                      • C:\Users\Admin\AppData\Local\Temp\zqewqv.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\zqewqv.exe"
                                                        4⤵
                                                        • Drops startup file
                                                        • Executes dropped EXE
                                                        • Adds Run key to start application
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3140
                                                        • C:\Windows\System32\schtasks.exe
                                                          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "zqewqv" /tr "C:\Users\Admin\AppData\Roaming\zqewqv.exe"
                                                          5⤵
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2876
                                                        • C:\Users\Admin\AppData\Local\Temp\uzdxqt.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\uzdxqt.exe"
                                                          5⤵
                                                          • Executes dropped EXE
                                                          PID:756
                                                        • C:\Users\Admin\AppData\Local\Temp\nbeayw.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\nbeayw.exe"
                                                          5⤵
                                                            PID:3580
                                                          • C:\Users\Admin\AppData\Local\Temp\ldnuan.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\ldnuan.exe"
                                                            5⤵
                                                              PID:2784
                                                            • C:\Users\Admin\AppData\Local\Temp\mfeydg.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\mfeydg.exe"
                                                              5⤵
                                                              • Drops startup file
                                                              • Adds Run key to start application
                                                              PID:3420
                                                              • C:\Windows\System32\schtasks.exe
                                                                "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "mfeydg" /tr "C:\Users\Admin\AppData\Roaming\mfeydg.exe"
                                                                6⤵
                                                                • Scheduled Task/Job: Scheduled Task
                                                                PID:4484
                                                              • C:\Users\Admin\AppData\Local\Temp\ecnceb.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\ecnceb.exe"
                                                                6⤵
                                                                  PID:896
                                                                • C:\Users\Admin\AppData\Local\Temp\dkloko.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\dkloko.exe"
                                                                  6⤵
                                                                    PID:1796
                                                                  • C:\Users\Admin\AppData\Local\Temp\rhicmu.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\rhicmu.exe"
                                                                    6⤵
                                                                      PID:1896
                                                                    • C:\Users\Admin\AppData\Local\Temp\qrnenw.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\qrnenw.exe"
                                                                      6⤵
                                                                        PID:872
                                                                      • C:\Users\Admin\AppData\Local\Temp\xmdvgb.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\xmdvgb.exe"
                                                                        6⤵
                                                                          PID:3304
                                                                        • C:\Users\Admin\AppData\Local\Temp\ztwekl.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\ztwekl.exe"
                                                                          6⤵
                                                                            PID:1196
                                                                          • C:\Users\Admin\AppData\Local\Temp\ollbsk.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\ollbsk.exe"
                                                                            6⤵
                                                                            • Drops startup file
                                                                            • Adds Run key to start application
                                                                            PID:2796
                                                                            • C:\Windows\System32\schtasks.exe
                                                                              "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "ollbsk" /tr "C:\Users\Admin\AppData\Roaming\ollbsk.exe"
                                                                              7⤵
                                                                              • Scheduled Task/Job: Scheduled Task
                                                                              PID:4840
                                                                            • C:\Users\Admin\AppData\Local\Temp\vehgwn.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\vehgwn.exe"
                                                                              7⤵
                                                                              • Drops startup file
                                                                              • Adds Run key to start application
                                                                              PID:1072
                                                                              • C:\Windows\System32\schtasks.exe
                                                                                "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "vehgwn" /tr "C:\Users\Admin\AppData\Roaming\vehgwn.exe"
                                                                                8⤵
                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                PID:3736
                                                                              • C:\Users\Admin\AppData\Local\Temp\swtpoe.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\swtpoe.exe"
                                                                                8⤵
                                                                                  PID:2920
                                                                                • C:\Users\Admin\AppData\Local\Temp\rjrksy.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\rjrksy.exe"
                                                                                  8⤵
                                                                                    PID:2160
                                                                                  • C:\Users\Admin\AppData\Local\Temp\ctwalp.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\ctwalp.exe"
                                                                                    8⤵
                                                                                      PID:1416
                                                                                    • C:\Users\Admin\AppData\Local\Temp\rrgrbn.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\rrgrbn.exe"
                                                                                      8⤵
                                                                                        PID:4984
                                                                                      • C:\Users\Admin\AppData\Local\Temp\lzcbvh.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\lzcbvh.exe"
                                                                                        8⤵
                                                                                          PID:3736
                                                                                        • C:\Users\Admin\AppData\Local\Temp\fctfmx.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\fctfmx.exe"
                                                                                          8⤵
                                                                                            PID:788
                                                                                        • C:\Users\Admin\AppData\Local\Temp\wypgyg.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\wypgyg.exe"
                                                                                          7⤵
                                                                                            PID:1848
                                                                                          • C:\Users\Admin\AppData\Local\Temp\tstgmq.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\tstgmq.exe"
                                                                                            7⤵
                                                                                              PID:4984
                                                                                            • C:\Users\Admin\AppData\Local\Temp\stelyr.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\stelyr.exe"
                                                                                              7⤵
                                                                                              • Drops startup file
                                                                                              • Adds Run key to start application
                                                                                              PID:3696
                                                                                              • C:\Windows\System32\schtasks.exe
                                                                                                "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "stelyr" /tr "C:\Users\Admin\AppData\Roaming\stelyr.exe"
                                                                                                8⤵
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:3304
                                                                                              • C:\Users\Admin\AppData\Local\Temp\eztrif.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\eztrif.exe"
                                                                                                8⤵
                                                                                                  PID:2580
                                                                                                • C:\Users\Admin\AppData\Local\Temp\ppzclg.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ppzclg.exe"
                                                                                                  8⤵
                                                                                                    PID:724
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\qurtun.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\qurtun.exe"
                                                                                                    8⤵
                                                                                                      PID:3184
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\erkrci.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\erkrci.exe"
                                                                                                      8⤵
                                                                                                        PID:4644
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\omufpn.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\omufpn.exe"
                                                                                                      7⤵
                                                                                                        PID:4500
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\psztuc.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\psztuc.exe"
                                                                                                        7⤵
                                                                                                          PID:984
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\dprudb.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\dprudb.exe"
                                                                                                          7⤵
                                                                                                            PID:1692
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\itxtzn.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\itxtzn.exe"
                                                                                                            7⤵
                                                                                                              PID:1704
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\taptop.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\taptop.exe"
                                                                                                              7⤵
                                                                                                                PID:4588
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\tpnuuc.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\tpnuuc.exe"
                                                                                                              6⤵
                                                                                                                PID:3676
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ugcfzd.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ugcfzd.exe"
                                                                                                                6⤵
                                                                                                                  PID:1668
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\izores.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\izores.exe"
                                                                                                                  6⤵
                                                                                                                    PID:2304
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\yiejpq.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\yiejpq.exe"
                                                                                                                    6⤵
                                                                                                                      PID:5020
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\snxxna.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\snxxna.exe"
                                                                                                                      6⤵
                                                                                                                        PID:1996
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\jozcly.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\jozcly.exe"
                                                                                                                        6⤵
                                                                                                                          PID:1572
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\idrbaz.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\idrbaz.exe"
                                                                                                                          6⤵
                                                                                                                            PID:4392
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ytuswk.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ytuswk.exe"
                                                                                                                            6⤵
                                                                                                                              PID:4952
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\wxgtdk.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\wxgtdk.exe"
                                                                                                                              6⤵
                                                                                                                                PID:912
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\gjzxbh.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\gjzxbh.exe"
                                                                                                                                6⤵
                                                                                                                                  PID:1416
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\fxsbwk.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\fxsbwk.exe"
                                                                                                                                  6⤵
                                                                                                                                    PID:2540
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\maxpwa.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\maxpwa.exe"
                                                                                                                                  5⤵
                                                                                                                                    PID:3424
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ppsdmt.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\ppsdmt.exe"
                                                                                                                                    5⤵
                                                                                                                                      PID:3872
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\qellap.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\qellap.exe"
                                                                                                                                      5⤵
                                                                                                                                        PID:4952
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\gayjhd.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\gayjhd.exe"
                                                                                                                                        5⤵
                                                                                                                                          PID:984
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\rateqg.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\rateqg.exe"
                                                                                                                                          5⤵
                                                                                                                                            PID:5004
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\owvxkq.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\owvxkq.exe"
                                                                                                                                            5⤵
                                                                                                                                              PID:2296
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\vxfelj.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\vxfelj.exe"
                                                                                                                                              5⤵
                                                                                                                                                PID:3400
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ehruev.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ehruev.exe"
                                                                                                                                                5⤵
                                                                                                                                                  PID:2560
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\caford.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\caford.exe"
                                                                                                                                                  5⤵
                                                                                                                                                    PID:3256
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\idtuyw.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\idtuyw.exe"
                                                                                                                                                    5⤵
                                                                                                                                                      PID:3412
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\hlylop.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\hlylop.exe"
                                                                                                                                                      5⤵
                                                                                                                                                        PID:696
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\ystvqd.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\ystvqd.exe"
                                                                                                                                                        5⤵
                                                                                                                                                          PID:4108
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\kcpofz.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\kcpofz.exe"
                                                                                                                                                          5⤵
                                                                                                                                                            PID:384
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\mxvxcq.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\mxvxcq.exe"
                                                                                                                                                            5⤵
                                                                                                                                                              PID:1032
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\baesph.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\baesph.exe"
                                                                                                                                                              5⤵
                                                                                                                                                                PID:1160
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\xbyiwa.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\xbyiwa.exe"
                                                                                                                                                                5⤵
                                                                                                                                                                  PID:1296
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\kssbwl.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\kssbwl.exe"
                                                                                                                                                                  5⤵
                                                                                                                                                                    PID:4964
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\chkbdp.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\chkbdp.exe"
                                                                                                                                                                    5⤵
                                                                                                                                                                      PID:3408
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\ntxtib.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\ntxtib.exe"
                                                                                                                                                                      5⤵
                                                                                                                                                                        PID:768
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\ajiijo.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\ajiijo.exe"
                                                                                                                                                                        5⤵
                                                                                                                                                                          PID:1352
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\gdoeqt.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\gdoeqt.exe"
                                                                                                                                                                        4⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                        PID:3680
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\ldbsfg.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\ldbsfg.exe"
                                                                                                                                                                        4⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        PID:4020
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\gpthlc.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\gpthlc.exe"
                                                                                                                                                                        4⤵
                                                                                                                                                                          PID:4092
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\wbtpnc.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\wbtpnc.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                            PID:1944
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\rfxytl.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\rfxytl.exe"
                                                                                                                                                                            4⤵
                                                                                                                                                                              PID:2276
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\dlqpsb.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\dlqpsb.exe"
                                                                                                                                                                              4⤵
                                                                                                                                                                                PID:3212
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vzoord.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\vzoord.exe"
                                                                                                                                                                                4⤵
                                                                                                                                                                                  PID:2164
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\xuuhxa.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\xuuhxa.exe"
                                                                                                                                                                                  4⤵
                                                                                                                                                                                    PID:5040
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\vrfbzo.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\vrfbzo.exe"
                                                                                                                                                                                    4⤵
                                                                                                                                                                                      PID:5020
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\bqplml.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\bqplml.exe"
                                                                                                                                                                                      4⤵
                                                                                                                                                                                        PID:3568
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\vmjqou.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\vmjqou.exe"
                                                                                                                                                                                        4⤵
                                                                                                                                                                                          PID:4612
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\pqxsml.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\pqxsml.exe"
                                                                                                                                                                                          4⤵
                                                                                                                                                                                            PID:3432
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\oikprt.exe
                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\oikprt.exe"
                                                                                                                                                                                            4⤵
                                                                                                                                                                                              PID:3412
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\hkhxdc.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\hkhxdc.exe"
                                                                                                                                                                                              4⤵
                                                                                                                                                                                                PID:2680
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\fbmbnb.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\fbmbnb.exe"
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                  PID:1236
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\lkmdse.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\lkmdse.exe"
                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                    PID:956
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\thfasg.exe
                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\thfasg.exe"
                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                      PID:2896
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\ddftnq.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\ddftnq.exe"
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                        PID:4500
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\emzwdc.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\emzwdc.exe"
                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                          PID:4776
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\dyjhkm.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\dyjhkm.exe"
                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                            PID:2620
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\hncvgc.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\hncvgc.exe"
                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                              PID:3512
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\zkqfwj.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\zkqfwj.exe"
                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                              • Drops startup file
                                                                                                                                                                                                              • Adds Run key to start application
                                                                                                                                                                                                              PID:412
                                                                                                                                                                                                              • C:\Windows\System32\schtasks.exe
                                                                                                                                                                                                                "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "zkqfwj" /tr "C:\Users\Admin\AppData\Roaming\zkqfwj.exe"
                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                PID:4208
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\jjbtpx.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\jjbtpx.exe"
                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                  PID:2916
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\uopknn.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\uopknn.exe"
                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                    PID:384
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\whifra.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\whifra.exe"
                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                      PID:456
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\nhsatz.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\nhsatz.exe"
                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                      PID:4968
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\wlovxb.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\wlovxb.exe"
                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                        PID:4312
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\cpgjzt.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\cpgjzt.exe"
                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                          PID:940
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\bhhzrx.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\bhhzrx.exe"
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:3756
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\bbyjpw.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\bbyjpw.exe"
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:2364
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\oyplbw.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\oyplbw.exe"
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:4812
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\mibike.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\mibike.exe"
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:4964
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\duugmr.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\duugmr.exe"
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:228
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\vzhbsq.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\vzhbsq.exe"
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:1204
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\zcszce.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\zcszce.exe"
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        PID:924
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\fzpnxp.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\fzpnxp.exe"
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:2580
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\qnfzwt.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\qnfzwt.exe"
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                            PID:5112
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\cswdwx.exe
                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\cswdwx.exe"
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                              PID:3168
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\duogop.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\duogop.exe"
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                PID:1676
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\pngyly.exe
                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\pngyly.exe"
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                  PID:3216
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\enfwdl.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\enfwdl.exe"
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                    PID:1880
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\opxeqz.exe
                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\opxeqz.exe"
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                      PID:5104
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\mvdnya.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\mvdnya.exe"
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                        PID:1460
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\uwguwh.exe
                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\uwguwh.exe"
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                          PID:2584
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\qylzyj.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\qylzyj.exe"
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                            PID:3864
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\jrcgvi.exe
                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\jrcgvi.exe"
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                              PID:1000
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ngpkog.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\ngpkog.exe"
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:1948
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ayepus.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ayepus.exe"
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                  PID:2064
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\lcpfeo.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\lcpfeo.exe"
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                    PID:1916
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\rjryge.exe
                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\rjryge.exe"
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                      PID:2296
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\aoqnuy.exe
                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\aoqnuy.exe"
                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                        PID:236
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\xgzvzs.exe
                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\xgzvzs.exe"
                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                          PID:1912
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\kjizux.exe
                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\kjizux.exe"
                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                            PID:2236
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\cbesow.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\cbesow.exe"
                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                              PID:852
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\udmnol.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\udmnol.exe"
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                PID:1492
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\rpalkz.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\rpalkz.exe"
                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                  PID:3212
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\qndgrn.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\qndgrn.exe"
                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                    PID:3764
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tqcxvv.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\tqcxvv.exe"
                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                      PID:4572
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\zzpiwy.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\zzpiwy.exe"
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                    PID:1068
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\gzpyot.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\gzpyot.exe"
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                    PID:3408
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\mvjnjc.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\mvjnjc.exe"
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                    PID:4880
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\urswjq.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\urswjq.exe"
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                    PID:2200
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\sbbeyj.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\sbbeyj.exe"
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                    PID:2560
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\retrak.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\retrak.exe"
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                    PID:416
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\vdnrxu.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\vdnrxu.exe"
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                    PID:2900
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\jvobko.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\jvobko.exe"
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                    PID:1096
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\sxjdrh.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\sxjdrh.exe"
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                    PID:4748
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\kcqzpv.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\kcqzpv.exe"
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                    PID:1092
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\xcbghj.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\xcbghj.exe"
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                    PID:3824
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\auvyrf.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\auvyrf.exe"
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                    PID:1080
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\odtxnn.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\odtxnn.exe"
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                      PID:3656
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\crqnlb.exe
                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\crqnlb.exe"
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                        PID:2388
                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\znnmhx.exe
                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\znnmhx.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                          PID:924
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\uvostu.exe
                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\uvostu.exe"
                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                            PID:1796
                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tcoeap.exe
                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\tcoeap.exe"
                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                              PID:400
                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\tufepo.exe
                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\tufepo.exe"
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                PID:3680
                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\nmocxy.exe
                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\nmocxy.exe"
                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                  PID:1416
                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\fkqzgt.exe
                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\fkqzgt.exe"
                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                    PID:2388
                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\vonxdw.exe
                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\vonxdw.exe"
                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                      PID:2192
                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\rwjyel.exe
                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\rwjyel.exe"
                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                        PID:2512
                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\yxqatr.exe
                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\yxqatr.exe"
                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                          PID:2064
                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\vvyzyu.exe
                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\vvyzyu.exe"
                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                            PID:2380
                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\irypmj.exe
                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\irypmj.exe"
                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                              PID:3704
                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\dtvujm.exe
                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\dtvujm.exe"
                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                PID:404
                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\cvqins.exe
                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\cvqins.exe"
                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                  PID:788
                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\epiddz.exe
                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\epiddz.exe"
                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                    PID:3696
                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\heqzdl.exe
                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\heqzdl.exe"
                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                      PID:4700
                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\vwqsol.exe
                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\vwqsol.exe"
                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                        PID:1576
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\xbjzuk.exe
                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\xbjzuk.exe"
                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                          PID:784
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\penexy.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\penexy.exe"
                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                            PID:1080
                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\bnhfui.exe
                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\bnhfui.exe"
                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                              PID:4740
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\lfoyii.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\lfoyii.exe"
                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                PID:4952
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tepjyn.exe
                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\tepjyn.exe"
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                  PID:2492
                                                                                                                                                                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=5284,i,16473152266643908808,16926983457419056857,262144 --variations-seed-version --mojo-platform-channel-handle=4688 /prefetch:14
                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                  PID:3348
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:3568
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:680
                                                                                                                                                                                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=5116,i,16473152266643908808,16926983457419056857,262144 --variations-seed-version --mojo-platform-channel-handle=3880 /prefetch:14
                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                    PID:2812
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\qsuzkk.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\qsuzkk.exe
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                    PID:3556
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                    PID:4360
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\ktflyd.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\ktflyd.exe
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                    PID:4480
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\qsuzkk.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\qsuzkk.exe
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                    PID:4872
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                    PID:4600
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\ktflyd.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\ktflyd.exe
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                    PID:3028
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\ygwice.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\ygwice.exe
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                    PID:5008
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\qsuzkk.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\qsuzkk.exe
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                    PID:2452
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                    PID:752
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\eeicgz.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\eeicgz.exe
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                    PID:1544
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\ktflyd.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\ktflyd.exe
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                    PID:896
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\ygwice.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\ygwice.exe
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                    PID:4648
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\qsuzkk.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\qsuzkk.exe
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                    PID:2448
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                    PID:3424
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\eeicgz.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\eeicgz.exe
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                    PID:2704
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\ktflyd.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\ktflyd.exe
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                    PID:5032
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\ygwice.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\ygwice.exe
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                    PID:2624
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\qsuzkk.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\qsuzkk.exe
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                    PID:5076
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\zqewqv.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\zqewqv.exe
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                    PID:1572
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                    PID:4612
                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=4092,i,16473152266643908808,16926983457419056857,262144 --variations-seed-version --mojo-platform-channel-handle=4336 /prefetch:14
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                      PID:1676
                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\eeicgz.exe
                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\eeicgz.exe
                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                      PID:4228
                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\ktflyd.exe
                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\ktflyd.exe
                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                      PID:3176
                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\qsuzkk.exe
                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\qsuzkk.exe
                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                      PID:2616
                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\ygwice.exe
                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\ygwice.exe
                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                      PID:4024
                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\zqewqv.exe
                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\zqewqv.exe
                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                      PID:1164
                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                      PID:2944
                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\mfeydg.exe
                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\mfeydg.exe
                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                        PID:4136
                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\eeicgz.exe
                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\eeicgz.exe
                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                          PID:4944
                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\ktflyd.exe
                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\ktflyd.exe
                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                            PID:4924
                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\qsuzkk.exe
                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\qsuzkk.exe
                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                              PID:3876
                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ygwice.exe
                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\ygwice.exe
                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                PID:2492
                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\zqewqv.exe
                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\zqewqv.exe
                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                  PID:4132
                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                    PID:2280
                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\eeicgz.exe
                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\eeicgz.exe
                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                      PID:1844
                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\mfeydg.exe
                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\mfeydg.exe
                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                        PID:856
                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\ktflyd.exe
                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\ktflyd.exe
                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                          PID:1372
                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\ygwice.exe
                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\ygwice.exe
                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                            PID:2004
                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\qsuzkk.exe
                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\qsuzkk.exe
                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                              PID:3784
                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\zqewqv.exe
                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\zqewqv.exe
                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                PID:5032
                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                  PID:4892
                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\eeicgz.exe
                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\eeicgz.exe
                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                    PID:4652
                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\mfeydg.exe
                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\mfeydg.exe
                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                      PID:5004
                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\ktflyd.exe
                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\ktflyd.exe
                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                        PID:2296
                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\qsuzkk.exe
                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\qsuzkk.exe
                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                          PID:4984
                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\ygwice.exe
                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\ygwice.exe
                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                            PID:1292
                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\ollbsk.exe
                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\ollbsk.exe
                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                              PID:4188
                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\zqewqv.exe
                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\zqewqv.exe
                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                PID:1464
                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                  PID:5024
                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\eeicgz.exe
                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\eeicgz.exe
                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                    PID:2000
                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\mfeydg.exe
                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\mfeydg.exe
                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                      PID:3704
                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\vehgwn.exe
                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\vehgwn.exe
                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                        PID:680
                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\ktflyd.exe
                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\ktflyd.exe
                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                          PID:4136
                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\qsuzkk.exe
                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\qsuzkk.exe
                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                            PID:4176
                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\ygwice.exe
                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\ygwice.exe
                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                              PID:3864
                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ollbsk.exe
                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\ollbsk.exe
                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                PID:1460
                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\zqewqv.exe
                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\zqewqv.exe
                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                  PID:2332
                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                    PID:1044
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\eeicgz.exe
                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\eeicgz.exe
                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                      PID:4600
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\mfeydg.exe
                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\mfeydg.exe
                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                        PID:1696
                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\vehgwn.exe
                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\vehgwn.exe
                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                          PID:2896
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\ktflyd.exe
                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\ktflyd.exe
                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                            PID:2140
                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\ygwice.exe
                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\ygwice.exe
                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                              PID:1428
                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\qsuzkk.exe
                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\qsuzkk.exe
                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                PID:1092
                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\stelyr.exe
                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\stelyr.exe
                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                  PID:3212
                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\ollbsk.exe
                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\ollbsk.exe
                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                    PID:548
                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\zqewqv.exe
                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\zqewqv.exe
                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                      PID:680
                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                        PID:2396
                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\zkqfwj.exe
                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\zkqfwj.exe
                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                          PID:3712
                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\eeicgz.exe
                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\eeicgz.exe
                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                            PID:4772
                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\mfeydg.exe
                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\mfeydg.exe
                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                              PID:4292
                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\vehgwn.exe
                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\vehgwn.exe
                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                PID:3160
                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\ktflyd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\ktflyd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                  PID:1100
                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\qsuzkk.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\qsuzkk.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                    PID:3040
                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\ygwice.exe
                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\ygwice.exe
                                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:696
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\stelyr.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\stelyr.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                        PID:2756
                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\ollbsk.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\ollbsk.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                          PID:2292
                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\zqewqv.exe
                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\zqewqv.exe
                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                            PID:664
                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                              PID:236
                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\zkqfwj.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\zkqfwj.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                PID:3452
                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\mfeydg.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\mfeydg.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:2000
                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\eeicgz.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\eeicgz.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:644
                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\vehgwn.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\vehgwn.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:4396
                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\ktflyd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\ktflyd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:3332
                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\ygwice.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\ygwice.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:4984
                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\qsuzkk.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\qsuzkk.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:3792
                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\stelyr.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\stelyr.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:3764
                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ollbsk.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\ollbsk.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:956
                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\zqewqv.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\zqewqv.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3724
                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:1352

                                                                                                                                                                                                                                                                                                                                                                                                                                                  Network

                                                                                                                                                                                                                                                                                                                                                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                                                                                                                                                                  Replay Monitor

                                                                                                                                                                                                                                                                                                                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                                                                                                                                                                  Downloads

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\15415145.exe.log

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    654B

                                                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                    2cbbb74b7da1f720b48ed31085cbd5b8

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                    79caa9a3ea8abe1b9c4326c3633da64a5f724964

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                    e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                    ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    2KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                    627073ee3ca9676911bee35548eff2b8

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                    4c4b68c65e2cab9864b51167d710aa29ebdcff2e

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                    85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                    3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    944B

                                                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                    d0a4a3b9a52b8fe3b019f6cd0ef3dad6

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                    fed70ce7834c3b97edbd078eccda1e5effa527cd

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                    21942e513f223fdad778348fbb20617dd29f986bccd87824c0ae7f15649f3f31

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                    1a66f837b4e7fb6346d0500aeacb44902fb8a239bce23416271263eba46fddae58a17075e188ae43eb516c841e02c87e32ebd73256c7cc2c0713d00c35f1761b

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    944B

                                                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                    6f0e62045515b66d0a0105abc22dbf19

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                    894d685122f3f3c9a3457df2f0b12b0e851b394c

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                    529811e4d3496c559f3bd92cd877b93b719c3ac4834202aa76ab9e16e25f9319

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                    f78426df6032ee77f8c463446ab1c6bb4669ef7a2463dead831ec4ff83a07d7dc702d79372d8bcaf4594bf0fb6e11e9f027f3e0325de9b19be5f51b7b80ed54a

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vt2ea3yt.aej.ps1

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    60B

                                                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\eeicgz.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    156KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                    e2cf7cb958bda8d948e80bdb78d6e283

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                    34c18cf619966914046b7a8f9070b0ee9ca0523d

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                    07f878b812dc294a61fb6030dffab309e4a05bef322759a198f110aa88c3b402

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                    3197a3a08069a2a33cea248503132dff4369efe6b83d13db61ef5be81e26f5c3f57ecba9c31e73754f321848dcf491f19eb0249f5f182c2332ae0879ed84b56c

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ktflyd.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    159KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                    49a6b6e8627762b929999b0b1fe6d604

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                    4a47bbb17c6cbda79794428df97d203b7261af79

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                    ca6aa52d419303376de2c37b4c8f6bdd41e31e55de6d178520ad5056303b6571

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                    c967dcb9be6b1fa73f1ef50a7785c17919365857be63923c6cad53362931d9a1c9fb41a43d68a050ad2a50239580fc8294e61e2ba10ee19d185f4f91c035b85b

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\mfeydg.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    151KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                    5cdc9671612660bd34747c635218a649

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                    8cebfbdfc27689d9988d4512da7d855c13eb8e0b

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                    119b3e5a0b2aad4dc9a6a7376dde77e80826830a24a08aefd858710e79a11db9

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                    a33bfb9c9db6469274a38bee8038fa7a86b2e336e48776bee788b7b2b372556b5880253cdc7856339130ca8b29c199a739020e78ca29cc401f441e2ac18280ef

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ollbsk.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    161KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                    a2e166ef9ba63b78150b9e08767d0764

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                    885c223c8436ee6184f6335f3bcf7bd761e85319

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                    0626693b0820897af0b56b9092439ce955a2435b610127d1686ea256eddc230f

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                    04651a2f9f4d648b95e7a5e67a1e1ddbaa12d8d2d1fecbf2da956b58826ad2f0aee2b1e182b1beab3f73215185f7c402df67fed4e0bcf401a2eea64ec34c627b

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\qsuzkk.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    34KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                    950d739da650457fab6a225545794238

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                    e965286161ecda1b8c0072d8a2d80c191bb15705

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                    a571fcac5384158c4927e7c7cf07182b68eccf67845ba927beae44cd9835e3f8

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                    b7b91343176c5a7f6408b21fbc96c23d0b02c080b846e29f304ba91de1d0f37a772953e7ab65d1d627cb3490fbef3b85681564e878d8dcda57c0897dbad1d19b

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\stelyr.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    159KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                    c73cfd1942fdfaf5d6f3940ca42bbadd

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                    9c9424953c85d03daf296d7841577228d15e1884

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                    3d735b082f087b25561d293d17a6cda64326f3d48c1db53a2941ded1afc78773

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                    9d7ce397b67e704773f7a9ea6c9cd1e5345f2211a67ac5dd5f622118690ed295a18e763c47e5c208240f71d4bedb67ba1e869faff466602f8e97350f9df9495c

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\uzdxqt.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    30KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                    d8a05fae946f16dbb12d5489f2b68230

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                    f8068ceb85905539ed39dc4dc187088487b09e17

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                    7876b3d0721a40d4d80f873be9ff79e722e28bd24ba0ee9ab9faac5c7aa69899

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                    661fc778e40c260756d928fe3bed91c3cbc8884ac27a071e1bf3c8f97c9133bd4bd853371baed477a3988305c12e1c405d03059f8652d810a23eb6050f6ade77

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\vehgwn.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    161KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                    760aa2ef40d31c55f0019cc916e9de48

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                    0228e46ca0a0303bebf54a65bf5da8111c4de402

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                    7ae58db4879d8daf291c5eab58ca9b49bc1b5c63153a02d175d83406a71a2806

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                    ce85a4af522b22d696ff98e176e2f97280363ac5e4161e39dac8cb0404af8d20fc4efe0ddd9e39cfa07bef28b65960c9a56822c6436b715f37ec6df9bd512d04

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ygwice.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    166KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                    7a7586c1278ecdb7881a3b34f841b722

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                    8c991bb42729a7e34a096f9d3b23e7e0a25329a8

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                    e2e527d70759106b6d1f479d0a1edd99d9b57c7fdfde2fffd1705e2161438a7f

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                    79ddd9f08587767ab6b2b66fa7873b0de9a51b8ee52abe8b9ed7e7cf9c42ddd3e45069e978bde40e1708c44a7d8c6a5c271e1dd7129501227dcd8dc5477872b2

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\zkqfwj.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    158KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                    eccccd69bbde41339441e5278f21bc10

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                    d1d96bfea61f93c10064417f3682bcebd682a7ad

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                    69074dfb9990c949ae7238d95ff74d2cd294e54759ee1f087519aec081098541

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                    edb20574c49e7495eef969113f3a38979b8ef85669da30de4c0e0632ea2467fc3e11ef62686e32b5c90d29e99abc66d5cdc97d5bc420f356eb04b72e71553dea

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\zqewqv.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    152KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                    c0a4054bc0a6553d3a246d91e6cdc95b

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                    b8722a0cf5483539ce965098fb299ad129d1a36b

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                    0c20402e4957de72ae5e6c5ce00d0dfab6a49affb260996b3290d44264977909

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                    5f5e88e876e6363992cd28794203874d27fc204bc7df004d32bfa18ebd0797c8c89ccb6b4cc44d4bdf6a9b476d5be5bec2a91bdc7020ba7b3628b98c9587ea5e

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\15415145.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    59KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                    6c091ad6fae0fa76f44870d1a1b05cb4

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                    040f60c0ee3f4902f919025057e34ab4d11b1abd

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                    c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

                                                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                    3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/396-34-0x000001559DA70000-0x000001559DA92000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    136KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/412-1728-0x0000000000590000-0x00000000005BE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/756-481-0x0000000000590000-0x000000000059E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1072-1340-0x0000000000250000-0x000000000027E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1324-113-0x0000000000F10000-0x0000000000F3E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1436-225-0x00000000008C0000-0x00000000008F0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1536-1-0x0000000000EB0000-0x0000000000EC6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1536-10-0x00007FFD2BDA0000-0x00007FFD2C862000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1536-0-0x00007FFD2BDA3000-0x00007FFD2BDA5000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1536-11-0x00007FFD2BDA3000-0x00007FFD2BDA5000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1536-17-0x00007FFD2BDA0000-0x00007FFD2C862000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2796-1149-0x0000000000C50000-0x0000000000C7E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3140-388-0x00000000002C0000-0x00000000002EC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3348-313-0x0000000000E40000-0x0000000000E6E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3420-631-0x0000000000810000-0x000000000083C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3568-14-0x00007FFD2BDA0000-0x00007FFD2C862000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3568-16-0x00007FFD2BDA0000-0x00007FFD2C862000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3696-1559-0x0000000000150000-0x000000000017E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4784-32-0x0000000000F00000-0x0000000000F0E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                    56KB