Analysis

  • max time kernel
    897s
  • max time network
    900s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2025, 18:12

General

  • Target

    15415145.exe

  • Size

    59KB

  • MD5

    6c091ad6fae0fa76f44870d1a1b05cb4

  • SHA1

    040f60c0ee3f4902f919025057e34ab4d11b1abd

  • SHA256

    c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

  • SHA512

    3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

  • SSDEEP

    1536:skyZtyUQ8sBkROLW+UzbTH3gfm2qt0OgSko7:skItfQ8sBkROUzbTQf+6OgK7

Malware Config

Extracted

Family

xworm

Version

3.1

C2

known-savage.gl.at.ply.gg:45116

association-lectures.gl.at.ply.gg:32463

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain
aes.plain

Signatures

  • Detect Xworm Payload 24 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 11 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 22 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\15415145.exe
    "C:\Users\Admin\AppData\Local\Temp\15415145.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "15415145" /tr "C:\Users\Admin\AppData\Roaming\15415145.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:4948
    • C:\Users\Admin\AppData\Local\Temp\qaauvs.exe
      "C:\Users\Admin\AppData\Local\Temp\qaauvs.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3460
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\qaauvs.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4624
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'qaauvs.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4656
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\qaauvs.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4396
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "qaauvs" /tr "C:\Users\Admin\AppData\Roaming\qaauvs.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4960
    • C:\Users\Admin\AppData\Local\Temp\oujafy.exe
      "C:\Users\Admin\AppData\Local\Temp\oujafy.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1676
    • C:\Users\Admin\AppData\Local\Temp\rovcal.exe
      "C:\Users\Admin\AppData\Local\Temp\rovcal.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4260
    • C:\Users\Admin\AppData\Local\Temp\vigmhd.exe
      "C:\Users\Admin\AppData\Local\Temp\vigmhd.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2216
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "vigmhd" /tr "C:\Users\Admin\AppData\Roaming\vigmhd.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4816
      • C:\Users\Admin\AppData\Local\Temp\biosxa.exe
        "C:\Users\Admin\AppData\Local\Temp\biosxa.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3552
      • C:\Users\Admin\AppData\Local\Temp\ysglts.exe
        "C:\Users\Admin\AppData\Local\Temp\ysglts.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3036
      • C:\Users\Admin\AppData\Local\Temp\bekzvy.exe
        "C:\Users\Admin\AppData\Local\Temp\bekzvy.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:720
      • C:\Users\Admin\AppData\Local\Temp\daqorl.exe
        "C:\Users\Admin\AppData\Local\Temp\daqorl.exe"
        3⤵
        • Checks computer location settings
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2848
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "daqorl" /tr "C:\Users\Admin\AppData\Roaming\daqorl.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2128
        • C:\Users\Admin\AppData\Local\Temp\akilda.exe
          "C:\Users\Admin\AppData\Local\Temp\akilda.exe"
          4⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1116
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "akilda" /tr "C:\Users\Admin\AppData\Roaming\akilda.exe"
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:224
          • C:\Users\Admin\AppData\Local\Temp\nvzcng.exe
            "C:\Users\Admin\AppData\Local\Temp\nvzcng.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:4980
          • C:\Users\Admin\AppData\Local\Temp\czbblv.exe
            "C:\Users\Admin\AppData\Local\Temp\czbblv.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3020
          • C:\Users\Admin\AppData\Local\Temp\ikoqll.exe
            "C:\Users\Admin\AppData\Local\Temp\ikoqll.exe"
            5⤵
            • Executes dropped EXE
            PID:3008
          • C:\Users\Admin\AppData\Local\Temp\libuwj.exe
            "C:\Users\Admin\AppData\Local\Temp\libuwj.exe"
            5⤵
              PID:1604
            • C:\Users\Admin\AppData\Local\Temp\xcynaa.exe
              "C:\Users\Admin\AppData\Local\Temp\xcynaa.exe"
              5⤵
                PID:4384
              • C:\Users\Admin\AppData\Local\Temp\olthnq.exe
                "C:\Users\Admin\AppData\Local\Temp\olthnq.exe"
                5⤵
                  PID:4576
                • C:\Users\Admin\AppData\Local\Temp\oxpebg.exe
                  "C:\Users\Admin\AppData\Local\Temp\oxpebg.exe"
                  5⤵
                    PID:720
                  • C:\Users\Admin\AppData\Local\Temp\idezfe.exe
                    "C:\Users\Admin\AppData\Local\Temp\idezfe.exe"
                    5⤵
                      PID:3300
                    • C:\Users\Admin\AppData\Local\Temp\sghkjx.exe
                      "C:\Users\Admin\AppData\Local\Temp\sghkjx.exe"
                      5⤵
                        PID:1836
                      • C:\Users\Admin\AppData\Local\Temp\sszqfl.exe
                        "C:\Users\Admin\AppData\Local\Temp\sszqfl.exe"
                        5⤵
                          PID:4976
                        • C:\Users\Admin\AppData\Local\Temp\hpzbnz.exe
                          "C:\Users\Admin\AppData\Local\Temp\hpzbnz.exe"
                          5⤵
                            PID:1620
                          • C:\Users\Admin\AppData\Local\Temp\bawxbo.exe
                            "C:\Users\Admin\AppData\Local\Temp\bawxbo.exe"
                            5⤵
                              PID:1784
                            • C:\Users\Admin\AppData\Local\Temp\vhhvms.exe
                              "C:\Users\Admin\AppData\Local\Temp\vhhvms.exe"
                              5⤵
                                PID:2620
                              • C:\Users\Admin\AppData\Local\Temp\exxtuu.exe
                                "C:\Users\Admin\AppData\Local\Temp\exxtuu.exe"
                                5⤵
                                  PID:1856
                                • C:\Users\Admin\AppData\Local\Temp\sdbvou.exe
                                  "C:\Users\Admin\AppData\Local\Temp\sdbvou.exe"
                                  5⤵
                                    PID:2336
                                  • C:\Users\Admin\AppData\Local\Temp\ryrdwm.exe
                                    "C:\Users\Admin\AppData\Local\Temp\ryrdwm.exe"
                                    5⤵
                                      PID:1992
                                    • C:\Users\Admin\AppData\Local\Temp\ggqexe.exe
                                      "C:\Users\Admin\AppData\Local\Temp\ggqexe.exe"
                                      5⤵
                                        PID:3148
                                      • C:\Users\Admin\AppData\Local\Temp\hvetpc.exe
                                        "C:\Users\Admin\AppData\Local\Temp\hvetpc.exe"
                                        5⤵
                                          PID:4700
                                        • C:\Users\Admin\AppData\Local\Temp\qwghlh.exe
                                          "C:\Users\Admin\AppData\Local\Temp\qwghlh.exe"
                                          5⤵
                                            PID:4280
                                          • C:\Users\Admin\AppData\Local\Temp\onufjj.exe
                                            "C:\Users\Admin\AppData\Local\Temp\onufjj.exe"
                                            5⤵
                                              PID:1052
                                            • C:\Users\Admin\AppData\Local\Temp\yglcgd.exe
                                              "C:\Users\Admin\AppData\Local\Temp\yglcgd.exe"
                                              5⤵
                                                PID:612
                                              • C:\Users\Admin\AppData\Local\Temp\wrkuof.exe
                                                "C:\Users\Admin\AppData\Local\Temp\wrkuof.exe"
                                                5⤵
                                                  PID:4700
                                                • C:\Users\Admin\AppData\Local\Temp\czzsmz.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\czzsmz.exe"
                                                  5⤵
                                                    PID:4112
                                                  • C:\Users\Admin\AppData\Local\Temp\pyoyfs.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\pyoyfs.exe"
                                                    5⤵
                                                      PID:1744
                                                    • C:\Users\Admin\AppData\Local\Temp\ojmkpj.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\ojmkpj.exe"
                                                      5⤵
                                                        PID:3164
                                                      • C:\Users\Admin\AppData\Local\Temp\rbwhgr.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\rbwhgr.exe"
                                                        5⤵
                                                          PID:872
                                                      • C:\Users\Admin\AppData\Local\Temp\evteqw.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\evteqw.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3056
                                                      • C:\Users\Admin\AppData\Local\Temp\sfarwl.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\sfarwl.exe"
                                                        4⤵
                                                        • Checks computer location settings
                                                        • Drops startup file
                                                        • Executes dropped EXE
                                                        • Adds Run key to start application
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2520
                                                        • C:\Windows\System32\schtasks.exe
                                                          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "sfarwl" /tr "C:\Users\Admin\AppData\Roaming\sfarwl.exe"
                                                          5⤵
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:3920
                                                        • C:\Users\Admin\AppData\Local\Temp\axjqtt.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\axjqtt.exe"
                                                          5⤵
                                                          • Executes dropped EXE
                                                          PID:2128
                                                        • C:\Users\Admin\AppData\Local\Temp\jxjytq.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\jxjytq.exe"
                                                          5⤵
                                                          • Executes dropped EXE
                                                          PID:1048
                                                        • C:\Users\Admin\AppData\Local\Temp\eappzc.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\eappzc.exe"
                                                          5⤵
                                                            PID:428
                                                          • C:\Users\Admin\AppData\Local\Temp\fuuhbu.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\fuuhbu.exe"
                                                            5⤵
                                                            • Checks computer location settings
                                                            • Drops startup file
                                                            • Adds Run key to start application
                                                            PID:3008
                                                            • C:\Windows\System32\schtasks.exe
                                                              "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "fuuhbu" /tr "C:\Users\Admin\AppData\Roaming\fuuhbu.exe"
                                                              6⤵
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:3752
                                                            • C:\Users\Admin\AppData\Local\Temp\qnkbib.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\qnkbib.exe"
                                                              6⤵
                                                                PID:4404
                                                              • C:\Users\Admin\AppData\Local\Temp\xvyufh.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\xvyufh.exe"
                                                                6⤵
                                                                  PID:3316
                                                                • C:\Users\Admin\AppData\Local\Temp\jpmhmf.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\jpmhmf.exe"
                                                                  6⤵
                                                                    PID:4280
                                                                  • C:\Users\Admin\AppData\Local\Temp\olljzh.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\olljzh.exe"
                                                                    6⤵
                                                                      PID:1392
                                                                    • C:\Users\Admin\AppData\Local\Temp\nfqyjv.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\nfqyjv.exe"
                                                                      6⤵
                                                                        PID:3284
                                                                      • C:\Users\Admin\AppData\Local\Temp\hlllcf.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\hlllcf.exe"
                                                                        6⤵
                                                                          PID:1468
                                                                        • C:\Users\Admin\AppData\Local\Temp\hvbiir.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\hvbiir.exe"
                                                                          6⤵
                                                                            PID:2992
                                                                          • C:\Users\Admin\AppData\Local\Temp\zfjbdu.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\zfjbdu.exe"
                                                                            6⤵
                                                                              PID:3980
                                                                            • C:\Users\Admin\AppData\Local\Temp\wduzbz.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\wduzbz.exe"
                                                                              6⤵
                                                                                PID:744
                                                                              • C:\Users\Admin\AppData\Local\Temp\zgncnd.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\zgncnd.exe"
                                                                                6⤵
                                                                                  PID:1088
                                                                                • C:\Users\Admin\AppData\Local\Temp\kzmdmt.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\kzmdmt.exe"
                                                                                  6⤵
                                                                                    PID:4980
                                                                                  • C:\Users\Admin\AppData\Local\Temp\wymgzr.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\wymgzr.exe"
                                                                                    6⤵
                                                                                      PID:2288
                                                                                    • C:\Users\Admin\AppData\Local\Temp\egcuju.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\egcuju.exe"
                                                                                      6⤵
                                                                                        PID:1140
                                                                                      • C:\Users\Admin\AppData\Local\Temp\ymbwbg.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\ymbwbg.exe"
                                                                                        6⤵
                                                                                          PID:3356
                                                                                        • C:\Users\Admin\AppData\Local\Temp\aikmlv.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\aikmlv.exe"
                                                                                          6⤵
                                                                                            PID:916
                                                                                          • C:\Users\Admin\AppData\Local\Temp\rfhyxj.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\rfhyxj.exe"
                                                                                            6⤵
                                                                                              PID:1564
                                                                                            • C:\Users\Admin\AppData\Local\Temp\ewspfe.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\ewspfe.exe"
                                                                                              6⤵
                                                                                                PID:5068
                                                                                              • C:\Users\Admin\AppData\Local\Temp\hpdduu.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\hpdduu.exe"
                                                                                                6⤵
                                                                                                  PID:408
                                                                                              • C:\Users\Admin\AppData\Local\Temp\sosqbh.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\sosqbh.exe"
                                                                                                5⤵
                                                                                                  PID:2504
                                                                                                • C:\Users\Admin\AppData\Local\Temp\wjfceg.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\wjfceg.exe"
                                                                                                  5⤵
                                                                                                    PID:1872
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\mjthpv.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\mjthpv.exe"
                                                                                                    5⤵
                                                                                                      PID:2692
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\loejsk.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\loejsk.exe"
                                                                                                      5⤵
                                                                                                        PID:3304
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\edzlgn.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\edzlgn.exe"
                                                                                                        5⤵
                                                                                                          PID:2028
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\tsvpyf.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\tsvpyf.exe"
                                                                                                          5⤵
                                                                                                            PID:3356
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\bswbck.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\bswbck.exe"
                                                                                                            5⤵
                                                                                                              PID:1624
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\kbvidq.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\kbvidq.exe"
                                                                                                              5⤵
                                                                                                                PID:1064
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\iyfyvn.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\iyfyvn.exe"
                                                                                                                5⤵
                                                                                                                • Checks computer location settings
                                                                                                                • Drops startup file
                                                                                                                • Adds Run key to start application
                                                                                                                PID:2116
                                                                                                                • C:\Windows\System32\schtasks.exe
                                                                                                                  "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "iyfyvn" /tr "C:\Users\Admin\AppData\Roaming\iyfyvn.exe"
                                                                                                                  6⤵
                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                  PID:1568
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\vhvbks.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\vhvbks.exe"
                                                                                                                  6⤵
                                                                                                                  • Checks computer location settings
                                                                                                                  • Drops startup file
                                                                                                                  • Adds Run key to start application
                                                                                                                  PID:4720
                                                                                                                  • C:\Windows\System32\schtasks.exe
                                                                                                                    "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "vhvbks" /tr "C:\Users\Admin\AppData\Roaming\vhvbks.exe"
                                                                                                                    7⤵
                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                    PID:3004
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\octxlf.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\octxlf.exe"
                                                                                                                    7⤵
                                                                                                                      PID:3616
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\jfwlsf.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\jfwlsf.exe"
                                                                                                                      7⤵
                                                                                                                        PID:3844
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\vhsvrg.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\vhsvrg.exe"
                                                                                                                        7⤵
                                                                                                                          PID:5020
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\zbtcgl.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\zbtcgl.exe"
                                                                                                                          7⤵
                                                                                                                            PID:4976
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\cfeepr.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\cfeepr.exe"
                                                                                                                            7⤵
                                                                                                                              PID:2972
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\oqvuor.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\oqvuor.exe"
                                                                                                                              7⤵
                                                                                                                                PID:1964
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ooqyzj.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\ooqyzj.exe"
                                                                                                                              6⤵
                                                                                                                                PID:2284
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\xuthva.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\xuthva.exe"
                                                                                                                                6⤵
                                                                                                                                  PID:2804
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\wirebd.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\wirebd.exe"
                                                                                                                                  6⤵
                                                                                                                                  • Checks computer location settings
                                                                                                                                  • Drops startup file
                                                                                                                                  • Adds Run key to start application
                                                                                                                                  PID:4860
                                                                                                                                  • C:\Windows\System32\schtasks.exe
                                                                                                                                    "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "wirebd" /tr "C:\Users\Admin\AppData\Roaming\wirebd.exe"
                                                                                                                                    7⤵
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:1072
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tpdvqe.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\tpdvqe.exe"
                                                                                                                                    7⤵
                                                                                                                                    • Checks computer location settings
                                                                                                                                    • Drops startup file
                                                                                                                                    • Adds Run key to start application
                                                                                                                                    PID:1848
                                                                                                                                    • C:\Windows\System32\schtasks.exe
                                                                                                                                      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "tpdvqe" /tr "C:\Users\Admin\AppData\Roaming\tpdvqe.exe"
                                                                                                                                      8⤵
                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                      PID:1248
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\vfvaoq.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\vfvaoq.exe"
                                                                                                                                      8⤵
                                                                                                                                        PID:4916
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\avijzs.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\avijzs.exe"
                                                                                                                                        8⤵
                                                                                                                                          PID:896
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\glbgux.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\glbgux.exe"
                                                                                                                                          8⤵
                                                                                                                                            PID:1888
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\qmdxan.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\qmdxan.exe"
                                                                                                                                          7⤵
                                                                                                                                            PID:1088
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\kzynma.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\kzynma.exe"
                                                                                                                                            7⤵
                                                                                                                                              PID:1776
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\jldzsl.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\jldzsl.exe"
                                                                                                                                              7⤵
                                                                                                                                                PID:4800
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\nwpkup.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\nwpkup.exe"
                                                                                                                                              6⤵
                                                                                                                                                PID:664
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\hlzvdq.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\hlzvdq.exe"
                                                                                                                                                6⤵
                                                                                                                                                  PID:1260
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\mkvvsx.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\mkvvsx.exe"
                                                                                                                                                  6⤵
                                                                                                                                                    PID:3856
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\wwuzkm.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\wwuzkm.exe"
                                                                                                                                                    6⤵
                                                                                                                                                      PID:5032
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\myjeay.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\myjeay.exe"
                                                                                                                                                      6⤵
                                                                                                                                                        PID:4848
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\pjvimx.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\pjvimx.exe"
                                                                                                                                                      5⤵
                                                                                                                                                        PID:4428
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\ikcsjl.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\ikcsjl.exe"
                                                                                                                                                        5⤵
                                                                                                                                                          PID:3004
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\kwlogw.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\kwlogw.exe"
                                                                                                                                                          5⤵
                                                                                                                                                            PID:732
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\zkluzq.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\zkluzq.exe"
                                                                                                                                                            5⤵
                                                                                                                                                              PID:4560
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ovajci.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\ovajci.exe"
                                                                                                                                                              5⤵
                                                                                                                                                                PID:2828
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\iuwhzo.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\iuwhzo.exe"
                                                                                                                                                                5⤵
                                                                                                                                                                  PID:724
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\jtgysr.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\jtgysr.exe"
                                                                                                                                                                  5⤵
                                                                                                                                                                    PID:2408
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\hrskyg.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\hrskyg.exe"
                                                                                                                                                                    5⤵
                                                                                                                                                                      PID:208
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\furizl.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\furizl.exe"
                                                                                                                                                                      5⤵
                                                                                                                                                                        PID:640
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\cvjetq.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\cvjetq.exe"
                                                                                                                                                                        5⤵
                                                                                                                                                                          PID:636
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\wziuko.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\wziuko.exe"
                                                                                                                                                                          5⤵
                                                                                                                                                                            PID:1228
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\omaqvs.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\omaqvs.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                          PID:1620
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\cjdvzq.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\cjdvzq.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:1908
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\pdvwnx.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\pdvwnx.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                            PID:408
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\mihjuw.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\mihjuw.exe"
                                                                                                                                                                            4⤵
                                                                                                                                                                              PID:3760
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\txswtm.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\txswtm.exe"
                                                                                                                                                                              4⤵
                                                                                                                                                                                PID:2992
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\cmarrb.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\cmarrb.exe"
                                                                                                                                                                                4⤵
                                                                                                                                                                                  PID:1604
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\vjpqiu.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\vjpqiu.exe"
                                                                                                                                                                                  4⤵
                                                                                                                                                                                    PID:4396
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\xjvcpm.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\xjvcpm.exe"
                                                                                                                                                                                    4⤵
                                                                                                                                                                                      PID:3236
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\avrcen.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\avrcen.exe"
                                                                                                                                                                                      4⤵
                                                                                                                                                                                        PID:464
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\efrewy.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\efrewy.exe"
                                                                                                                                                                                        4⤵
                                                                                                                                                                                          PID:3224
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\zfqqsn.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\zfqqsn.exe"
                                                                                                                                                                                          4⤵
                                                                                                                                                                                            PID:1344
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\qymubd.exe
                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\qymubd.exe"
                                                                                                                                                                                            4⤵
                                                                                                                                                                                              PID:1268
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ivznll.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\ivznll.exe"
                                                                                                                                                                                              4⤵
                                                                                                                                                                                                PID:776
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\aqigwx.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\aqigwx.exe"
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                  PID:1896
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\vzhmnm.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\vzhmnm.exe"
                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                    PID:3964
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\jrnqrc.exe
                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\jrnqrc.exe"
                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                      PID:1968
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\dgqimq.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\dgqimq.exe"
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                        PID:2664
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\afunuj.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\afunuj.exe"
                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                          PID:3132
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\nqtgdg.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\nqtgdg.exe"
                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                            PID:2480
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\qtjsvt.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\qtjsvt.exe"
                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                              PID:5068
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\fdlzlk.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\fdlzlk.exe"
                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                PID:776
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\qrexke.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\qrexke.exe"
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                  PID:3412
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\userfq.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\userfq.exe"
                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                    PID:2264
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\cheyyx.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\cheyyx.exe"
                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                      PID:3504
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\tcnhax.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\tcnhax.exe"
                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                        PID:4212
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\jcuppj.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\jcuppj.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                      PID:1444
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\eyseff.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\eyseff.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                      PID:4680
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\xhxfcw.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\xhxfcw.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                      PID:2028
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\kraypp.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\kraypp.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                      PID:716
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\cyhivv.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\cyhivv.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                      PID:1692
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\dmqcjv.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\dmqcjv.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                      PID:180
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\ficwgv.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\ficwgv.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      PID:4264
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\axzebo.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\axzebo.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:1664
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\byytez.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\byytez.exe"
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:4996
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\klnfnr.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\klnfnr.exe"
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                            PID:688
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\cwdwbs.exe
                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\cwdwbs.exe"
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                              PID:4460
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\puybat.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\puybat.exe"
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                PID:3984
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tnlfxr.exe
                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\tnlfxr.exe"
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                  PID:4732
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\qywshw.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\qywshw.exe"
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                    PID:2344
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\xjiqsx.exe
                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\xjiqsx.exe"
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                      PID:3116
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\iavluk.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\iavluk.exe"
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                        PID:1776
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\sewgog.exe
                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\sewgog.exe"
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                          PID:3892
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\qzxeaq.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\qzxeaq.exe"
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                            PID:4404
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ofnvoo.exe
                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ofnvoo.exe"
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                              PID:180
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ujpgyr.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\ujpgyr.exe"
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:5020
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\jzcatz.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\jzcatz.exe"
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                  PID:3320
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\yhtant.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\yhtant.exe"
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                    PID:4896
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\vjjqch.exe
                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\vjjqch.exe"
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                      PID:1964
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\ztisbn.exe
                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\ztisbn.exe"
                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                        PID:3656
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\jmlgrl.exe
                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\jmlgrl.exe"
                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                          PID:4684
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ulfewp.exe
                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\ulfewp.exe"
                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                            PID:2664
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\epgxfs.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\epgxfs.exe"
                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                              PID:3356
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\xortaf.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\xortaf.exe"
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                PID:880
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\eegihe.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\eegihe.exe"
                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                  PID:4868
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\jrxoqg.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\jrxoqg.exe"
                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                    PID:1904
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\dqzhsa.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\dqzhsa.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:2004
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\dbubfb.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\dbubfb.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:1468
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\owenbt.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\owenbt.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:4712
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\twboxm.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\twboxm.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:5076
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\iadxtg.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\iadxtg.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:4552
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\xdtxqf.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\xdtxqf.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:3688
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\shbjxe.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\shbjxe.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:4712
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\epjuod.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\epjuod.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:1416
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ghhntk.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ghhntk.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:4552
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\cpsnzs.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\cpsnzs.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:4688
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\xfindc.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\xfindc.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:208
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\irfyvu.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\irfyvu.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  PID:3440
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\rjyxjh.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\rjyxjh.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                    PID:4536
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\cnmzql.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\cnmzql.exe"
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                      PID:3268
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\zkkivb.exe
                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\zkkivb.exe"
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                        PID:3932
                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\mehjms.exe
                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\mehjms.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                          PID:680
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\vrmgmw.exe
                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\vrmgmw.exe"
                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                            PID:1356
                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ximnvj.exe
                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ximnvj.exe"
                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                              PID:4640
                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\lefkkl.exe
                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\lefkkl.exe"
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                PID:2784
                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\fxpxnt.exe
                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\fxpxnt.exe"
                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                  PID:3904
                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\rzwemq.exe
                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\rzwemq.exe"
                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                    PID:3100
                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\mixgbs.exe
                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\mixgbs.exe"
                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                      PID:4888
                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\vwbpbi.exe
                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\vwbpbi.exe"
                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                        PID:220
                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\ymoawq.exe
                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\ymoawq.exe"
                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                          PID:3372
                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\vbtvdo.exe
                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\vbtvdo.exe"
                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                            PID:3844
                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\cydspm.exe
                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\cydspm.exe"
                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                              PID:2912
                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\atwwan.exe
                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\atwwan.exe"
                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                PID:3808
                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ledmpo.exe
                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ledmpo.exe"
                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                  PID:5088
                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\kqwgyb.exe
                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\kqwgyb.exe"
                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                    PID:4976
                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\frdfik.exe
                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\frdfik.exe"
                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                      PID:4404
                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\wrejdc.exe
                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\wrejdc.exe"
                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                        PID:4236
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\pcgooi.exe
                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\pcgooi.exe"
                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                          PID:3724
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\mbmbor.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\mbmbor.exe"
                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                            PID:408
                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\mimfln.exe
                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\mimfln.exe"
                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                              PID:4068
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\swzbnx.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\swzbnx.exe"
                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                PID:3732
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:636
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:1052
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:2524
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:3636
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:1524
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\vigmhd.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\vigmhd.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:3452
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\vigmhd.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\vigmhd.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:3236
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:448
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:3780
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\daqorl.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\daqorl.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:3260
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\vigmhd.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\vigmhd.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:640
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:3940
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\daqorl.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\daqorl.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:5060
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:4580
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\akilda.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\akilda.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:776
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\vigmhd.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\vigmhd.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:1664
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\akilda.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\akilda.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:4328
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:1136
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\daqorl.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\daqorl.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:1368
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:3704
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\sfarwl.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\sfarwl.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:3420
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\vigmhd.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\vigmhd.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:3828
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\akilda.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\akilda.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:4608
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:1312
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\daqorl.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\daqorl.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:4668
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:3676
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\sfarwl.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\sfarwl.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:2528
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\vigmhd.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\vigmhd.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                PID:1576
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\akilda.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\akilda.exe
                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                  PID:2624
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                    PID:2072
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\daqorl.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\daqorl.exe
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                      PID:3508
                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                        PID:3996
                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\sfarwl.exe
                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\sfarwl.exe
                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                          PID:2924
                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\fuuhbu.exe
                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\fuuhbu.exe
                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                            PID:100
                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\vigmhd.exe
                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\vigmhd.exe
                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                              PID:3496
                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\akilda.exe
                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\akilda.exe
                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                PID:4404
                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                  PID:664
                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\daqorl.exe
                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\daqorl.exe
                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                    PID:4232
                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\fuuhbu.exe
                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\fuuhbu.exe
                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                      PID:3004
                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                        PID:208
                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\sfarwl.exe
                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\sfarwl.exe
                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                          PID:2480
                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\vigmhd.exe
                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\vigmhd.exe
                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                            PID:3028
                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\akilda.exe
                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\akilda.exe
                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                              PID:1784
                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                PID:1524
                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\daqorl.exe
                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\daqorl.exe
                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                  PID:2708
                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\fuuhbu.exe
                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\fuuhbu.exe
                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                    PID:2920
                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                      PID:4252
                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\sfarwl.exe
                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\sfarwl.exe
                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                        PID:1036
                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\iyfyvn.exe
                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\iyfyvn.exe
                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                          PID:1816
                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\iyfyvn.exe
                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\iyfyvn.exe
                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                            PID:4524
                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\vigmhd.exe
                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\vigmhd.exe
                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                              PID:2040
                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\akilda.exe
                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\akilda.exe
                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                PID:1396
                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                  PID:3496
                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\daqorl.exe
                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\daqorl.exe
                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                    PID:3028
                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\fuuhbu.exe
                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\fuuhbu.exe
                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                      PID:1048
                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                        PID:4708
                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\sfarwl.exe
                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\sfarwl.exe
                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                          PID:688
                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\vhvbks.exe
                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\vhvbks.exe
                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                            PID:3116
                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\vigmhd.exe
                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\vigmhd.exe
                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                              PID:2992
                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\vhvbks.exe
                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\vhvbks.exe
                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                PID:4552
                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\iyfyvn.exe
                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\iyfyvn.exe
                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                  PID:1100
                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\akilda.exe
                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\akilda.exe
                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                    PID:2724
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                      PID:3060
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\daqorl.exe
                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\daqorl.exe
                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                        PID:4880
                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\fuuhbu.exe
                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\fuuhbu.exe
                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                          PID:2400
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                            PID:448
                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\sfarwl.exe
                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\sfarwl.exe
                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                              PID:1424
                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\wirebd.exe
                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\wirebd.exe
                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                PID:4476
                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\iyfyvn.exe
                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\iyfyvn.exe
                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                  PID:5056
                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\vhvbks.exe
                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\vhvbks.exe
                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                    PID:4708
                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\vigmhd.exe
                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\vigmhd.exe
                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                      PID:1728
                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\akilda.exe
                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\akilda.exe
                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                        PID:3840
                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                          PID:4420
                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\daqorl.exe
                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\daqorl.exe
                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                            PID:636
                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\fuuhbu.exe
                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\fuuhbu.exe
                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                              PID:2548
                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                PID:736
                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\sfarwl.exe
                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\sfarwl.exe
                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3916
                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\wirebd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\wirebd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                    PID:2204
                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\tpdvqe.exe
                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\tpdvqe.exe
                                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:2240
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\tpdvqe.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\tpdvqe.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                        PID:4264
                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\vhvbks.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\vhvbks.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                          PID:1692
                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\iyfyvn.exe
                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\iyfyvn.exe
                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                            PID:456
                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\vigmhd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\vigmhd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                              PID:4524
                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\akilda.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\akilda.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                PID:2620
                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:1528
                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\daqorl.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\daqorl.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:3184
                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\fuuhbu.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\fuuhbu.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:4904
                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:3148
                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\sfarwl.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\sfarwl.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:3324
                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\wirebd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\wirebd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:5036
                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\tpdvqe.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\tpdvqe.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:3028
                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\vigmhd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\vigmhd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:4452
                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\iyfyvn.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\iyfyvn.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:5020
                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\vhvbks.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\vhvbks.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:3560
                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\akilda.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\akilda.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:3156
                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\qaauvs.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:2172
                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\daqorl.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\daqorl.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:4496
                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\fuuhbu.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\fuuhbu.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:4936
                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:2824
                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\sfarwl.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\sfarwl.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:512
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\wirebd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\wirebd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:4892

                                                                                                                                                                                                                                                                                                                                                                                                                                                                Network

                                                                                                                                                                                                                                                                                                                                                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                                                                                                                                                                                Replay Monitor

                                                                                                                                                                                                                                                                                                                                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                                                                                                                                                                                Downloads

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\15415145.exe.log

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  654B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2ff39f6c7249774be85fd60a8f9a245e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  684ff36b31aedc1e587c8496c02722c6698c1c4e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  944B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6d42b6da621e8df5674e26b799c8e2aa

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  944B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  eb1ad317bd25b55b2bbdce8a28a74a94

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  98a3978be4d10d62e7411946474579ee5bdc5ea6

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9e94e7c9ac6134ee30e79498558aa1a5a1ac79a643666c3f8922eed215dd3a98

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d011f266c0240d84470c0f9577cd9e4927309bd19bb38570ca9704ed8e1d159f9bea982a59d3eefef72ce7a10bd81208b82e88ef57c7af587f7437a89769adc0

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yltzsxv3.x0b.ps1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  60B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\akilda.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  156KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e2cf7cb958bda8d948e80bdb78d6e283

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  34c18cf619966914046b7a8f9070b0ee9ca0523d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  07f878b812dc294a61fb6030dffab309e4a05bef322759a198f110aa88c3b402

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3197a3a08069a2a33cea248503132dff4369efe6b83d13db61ef5be81e26f5c3f57ecba9c31e73754f321848dcf491f19eb0249f5f182c2332ae0879ed84b56c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\aqigwx.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  161KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a2e166ef9ba63b78150b9e08767d0764

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  885c223c8436ee6184f6335f3bcf7bd761e85319

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0626693b0820897af0b56b9092439ce955a2435b610127d1686ea256eddc230f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  04651a2f9f4d648b95e7a5e67a1e1ddbaa12d8d2d1fecbf2da956b58826ad2f0aee2b1e182b1beab3f73215185f7c402df67fed4e0bcf401a2eea64ec34c627b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\axjqtt.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  30KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d8a05fae946f16dbb12d5489f2b68230

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f8068ceb85905539ed39dc4dc187088487b09e17

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7876b3d0721a40d4d80f873be9ff79e722e28bd24ba0ee9ab9faac5c7aa69899

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  661fc778e40c260756d928fe3bed91c3cbc8884ac27a071e1bf3c8f97c9133bd4bd853371baed477a3988305c12e1c405d03059f8652d810a23eb6050f6ade77

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\daqorl.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  166KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7a7586c1278ecdb7881a3b34f841b722

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8c991bb42729a7e34a096f9d3b23e7e0a25329a8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e2e527d70759106b6d1f479d0a1edd99d9b57c7fdfde2fffd1705e2161438a7f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  79ddd9f08587767ab6b2b66fa7873b0de9a51b8ee52abe8b9ed7e7cf9c42ddd3e45069e978bde40e1708c44a7d8c6a5c271e1dd7129501227dcd8dc5477872b2

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\fuuhbu.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  151KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5cdc9671612660bd34747c635218a649

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8cebfbdfc27689d9988d4512da7d855c13eb8e0b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  119b3e5a0b2aad4dc9a6a7376dde77e80826830a24a08aefd858710e79a11db9

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a33bfb9c9db6469274a38bee8038fa7a86b2e336e48776bee788b7b2b372556b5880253cdc7856339130ca8b29c199a739020e78ca29cc401f441e2ac18280ef

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\qaauvs.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  34KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  950d739da650457fab6a225545794238

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e965286161ecda1b8c0072d8a2d80c191bb15705

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a571fcac5384158c4927e7c7cf07182b68eccf67845ba927beae44cd9835e3f8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b7b91343176c5a7f6408b21fbc96c23d0b02c080b846e29f304ba91de1d0f37a772953e7ab65d1d627cb3490fbef3b85681564e878d8dcda57c0897dbad1d19b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\sfarwl.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  152KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c0a4054bc0a6553d3a246d91e6cdc95b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b8722a0cf5483539ce965098fb299ad129d1a36b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0c20402e4957de72ae5e6c5ce00d0dfab6a49affb260996b3290d44264977909

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5f5e88e876e6363992cd28794203874d27fc204bc7df004d32bfa18ebd0797c8c89ccb6b4cc44d4bdf6a9b476d5be5bec2a91bdc7020ba7b3628b98c9587ea5e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tpdvqe.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  158KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  eccccd69bbde41339441e5278f21bc10

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d1d96bfea61f93c10064417f3682bcebd682a7ad

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  69074dfb9990c949ae7238d95ff74d2cd294e54759ee1f087519aec081098541

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  edb20574c49e7495eef969113f3a38979b8ef85669da30de4c0e0632ea2467fc3e11ef62686e32b5c90d29e99abc66d5cdc97d5bc420f356eb04b72e71553dea

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\vhvbks.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  161KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  760aa2ef40d31c55f0019cc916e9de48

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0228e46ca0a0303bebf54a65bf5da8111c4de402

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7ae58db4879d8daf291c5eab58ca9b49bc1b5c63153a02d175d83406a71a2806

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ce85a4af522b22d696ff98e176e2f97280363ac5e4161e39dac8cb0404af8d20fc4efe0ddd9e39cfa07bef28b65960c9a56822c6436b715f37ec6df9bd512d04

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\vigmhd.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  159KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  49a6b6e8627762b929999b0b1fe6d604

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4a47bbb17c6cbda79794428df97d203b7261af79

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ca6aa52d419303376de2c37b4c8f6bdd41e31e55de6d178520ad5056303b6571

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c967dcb9be6b1fa73f1ef50a7785c17919365857be63923c6cad53362931d9a1c9fb41a43d68a050ad2a50239580fc8294e61e2ba10ee19d185f4f91c035b85b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\wirebd.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  159KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c73cfd1942fdfaf5d6f3940ca42bbadd

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9c9424953c85d03daf296d7841577228d15e1884

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3d735b082f087b25561d293d17a6cda64326f3d48c1db53a2941ded1afc78773

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9d7ce397b67e704773f7a9ea6c9cd1e5345f2211a67ac5dd5f622118690ed295a18e763c47e5c208240f71d4bedb67ba1e869faff466602f8e97350f9df9495c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  59KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6c091ad6fae0fa76f44870d1a1b05cb4

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  040f60c0ee3f4902f919025057e34ab4d11b1abd

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/636-15-0x00007FFA249C0000-0x00007FFA25481000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/636-17-0x00007FFA249C0000-0x00007FFA25481000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1116-316-0x0000000000090000-0x00000000000BE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1848-1732-0x0000000000B10000-0x0000000000B3E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2116-1164-0x00000000003C0000-0x00000000003EE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2128-483-0x00000000009B0000-0x00000000009BE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2216-115-0x0000000000340000-0x000000000036E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2412-12-0x00007FFA249C0000-0x00007FFA25481000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2412-0-0x00007FFA249C3000-0x00007FFA249C5000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2412-11-0x00007FFA249C3000-0x00007FFA249C5000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2412-10-0x00007FFA249C0000-0x00007FFA25481000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2412-1-0x0000000000D30000-0x0000000000D46000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2520-392-0x0000000000420000-0x000000000044C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2848-228-0x00000000001C0000-0x00000000001F0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/3008-632-0x0000000000E60000-0x0000000000E8C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/3460-29-0x00000000009A0000-0x00000000009AE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4624-31-0x000001E9EAAF0000-0x000001E9EAB12000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  136KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4720-1342-0x0000000000FC0000-0x0000000000FEE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4860-1561-0x00000000008E0000-0x000000000090E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB