Analysis

  • max time kernel
    899s
  • max time network
    901s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2025, 18:12

General

  • Target

    15415145.exe

  • Size

    59KB

  • MD5

    6c091ad6fae0fa76f44870d1a1b05cb4

  • SHA1

    040f60c0ee3f4902f919025057e34ab4d11b1abd

  • SHA256

    c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

  • SHA512

    3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

  • SSDEEP

    1536:skyZtyUQ8sBkROLW+UzbTH3gfm2qt0OgSko7:skItfQ8sBkROUzbTQf+6OgK7

Malware Config

Extracted

Family

xworm

Version

3.1

C2

known-savage.gl.at.ply.gg:45116

association-lectures.gl.at.ply.gg:32463

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain
aes.plain

Signatures

  • Detect Xworm Payload 24 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 11 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 22 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\15415145.exe
    "C:\Users\Admin\AppData\Local\Temp\15415145.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:216
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "15415145" /tr "C:\Users\Admin\AppData\Roaming\15415145.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:4940
    • C:\Users\Admin\AppData\Local\Temp\pvfafi.exe
      "C:\Users\Admin\AppData\Local\Temp\pvfafi.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4532
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\pvfafi.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4164
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'pvfafi.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2916
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\pvfafi.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2128
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "pvfafi" /tr "C:\Users\Admin\AppData\Roaming\pvfafi.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2660
    • C:\Users\Admin\AppData\Local\Temp\xmzcqa.exe
      "C:\Users\Admin\AppData\Local\Temp\xmzcqa.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1624
    • C:\Users\Admin\AppData\Local\Temp\rnpgpp.exe
      "C:\Users\Admin\AppData\Local\Temp\rnpgpp.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3252
    • C:\Users\Admin\AppData\Local\Temp\bifhio.exe
      "C:\Users\Admin\AppData\Local\Temp\bifhio.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1920
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "bifhio" /tr "C:\Users\Admin\AppData\Roaming\bifhio.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4488
      • C:\Users\Admin\AppData\Local\Temp\iatvfo.exe
        "C:\Users\Admin\AppData\Local\Temp\iatvfo.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2712
      • C:\Users\Admin\AppData\Local\Temp\orjnhr.exe
        "C:\Users\Admin\AppData\Local\Temp\orjnhr.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:956
      • C:\Users\Admin\AppData\Local\Temp\wdfzge.exe
        "C:\Users\Admin\AppData\Local\Temp\wdfzge.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2484
      • C:\Users\Admin\AppData\Local\Temp\epvdkf.exe
        "C:\Users\Admin\AppData\Local\Temp\epvdkf.exe"
        3⤵
        • Checks computer location settings
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4948
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "epvdkf" /tr "C:\Users\Admin\AppData\Roaming\epvdkf.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:4872
        • C:\Users\Admin\AppData\Local\Temp\kicsqp.exe
          "C:\Users\Admin\AppData\Local\Temp\kicsqp.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2320
        • C:\Users\Admin\AppData\Local\Temp\bgmwzj.exe
          "C:\Users\Admin\AppData\Local\Temp\bgmwzj.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:4684
        • C:\Users\Admin\AppData\Local\Temp\ncxhyt.exe
          "C:\Users\Admin\AppData\Local\Temp\ncxhyt.exe"
          4⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          PID:3132
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "ncxhyt" /tr "C:\Users\Admin\AppData\Roaming\ncxhyt.exe"
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:3156
          • C:\Users\Admin\AppData\Local\Temp\dmzjzt.exe
            "C:\Users\Admin\AppData\Local\Temp\dmzjzt.exe"
            5⤵
            • Executes dropped EXE
            PID:2620
          • C:\Users\Admin\AppData\Local\Temp\ywsmmt.exe
            "C:\Users\Admin\AppData\Local\Temp\ywsmmt.exe"
            5⤵
            • Executes dropped EXE
            PID:940
          • C:\Users\Admin\AppData\Local\Temp\umndoe.exe
            "C:\Users\Admin\AppData\Local\Temp\umndoe.exe"
            5⤵
              PID:412
            • C:\Users\Admin\AppData\Local\Temp\fjnapu.exe
              "C:\Users\Admin\AppData\Local\Temp\fjnapu.exe"
              5⤵
              • Checks computer location settings
              • Drops startup file
              • Adds Run key to start application
              PID:4052
              • C:\Windows\System32\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "fjnapu" /tr "C:\Users\Admin\AppData\Roaming\fjnapu.exe"
                6⤵
                • Scheduled Task/Job: Scheduled Task
                PID:1672
              • C:\Users\Admin\AppData\Local\Temp\eicnkl.exe
                "C:\Users\Admin\AppData\Local\Temp\eicnkl.exe"
                6⤵
                  PID:1380
                • C:\Users\Admin\AppData\Local\Temp\prkchj.exe
                  "C:\Users\Admin\AppData\Local\Temp\prkchj.exe"
                  6⤵
                    PID:2016
                  • C:\Users\Admin\AppData\Local\Temp\ozspdc.exe
                    "C:\Users\Admin\AppData\Local\Temp\ozspdc.exe"
                    6⤵
                      PID:4608
                    • C:\Users\Admin\AppData\Local\Temp\mvgunv.exe
                      "C:\Users\Admin\AppData\Local\Temp\mvgunv.exe"
                      6⤵
                        PID:4724
                      • C:\Users\Admin\AppData\Local\Temp\xqholv.exe
                        "C:\Users\Admin\AppData\Local\Temp\xqholv.exe"
                        6⤵
                          PID:2988
                        • C:\Users\Admin\AppData\Local\Temp\qszlke.exe
                          "C:\Users\Admin\AppData\Local\Temp\qszlke.exe"
                          6⤵
                            PID:2376
                          • C:\Users\Admin\AppData\Local\Temp\ubjnqk.exe
                            "C:\Users\Admin\AppData\Local\Temp\ubjnqk.exe"
                            6⤵
                              PID:5012
                            • C:\Users\Admin\AppData\Local\Temp\lqaueo.exe
                              "C:\Users\Admin\AppData\Local\Temp\lqaueo.exe"
                              6⤵
                                PID:3028
                              • C:\Users\Admin\AppData\Local\Temp\qdnqmq.exe
                                "C:\Users\Admin\AppData\Local\Temp\qdnqmq.exe"
                                6⤵
                                  PID:2704
                                • C:\Users\Admin\AppData\Local\Temp\njvhqu.exe
                                  "C:\Users\Admin\AppData\Local\Temp\njvhqu.exe"
                                  6⤵
                                    PID:1380
                                  • C:\Users\Admin\AppData\Local\Temp\dagolo.exe
                                    "C:\Users\Admin\AppData\Local\Temp\dagolo.exe"
                                    6⤵
                                      PID:3784
                                    • C:\Users\Admin\AppData\Local\Temp\kcpoub.exe
                                      "C:\Users\Admin\AppData\Local\Temp\kcpoub.exe"
                                      6⤵
                                        PID:440
                                      • C:\Users\Admin\AppData\Local\Temp\syfwjx.exe
                                        "C:\Users\Admin\AppData\Local\Temp\syfwjx.exe"
                                        6⤵
                                          PID:4160
                                        • C:\Users\Admin\AppData\Local\Temp\ucmtxh.exe
                                          "C:\Users\Admin\AppData\Local\Temp\ucmtxh.exe"
                                          6⤵
                                            PID:2740
                                          • C:\Users\Admin\AppData\Local\Temp\iagjxb.exe
                                            "C:\Users\Admin\AppData\Local\Temp\iagjxb.exe"
                                            6⤵
                                              PID:2584
                                            • C:\Users\Admin\AppData\Local\Temp\inkpjp.exe
                                              "C:\Users\Admin\AppData\Local\Temp\inkpjp.exe"
                                              6⤵
                                                PID:4148
                                              • C:\Users\Admin\AppData\Local\Temp\dxfmkb.exe
                                                "C:\Users\Admin\AppData\Local\Temp\dxfmkb.exe"
                                                6⤵
                                                  PID:2236
                                                • C:\Users\Admin\AppData\Local\Temp\ycjlyn.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\ycjlyn.exe"
                                                  6⤵
                                                    PID:3372
                                                • C:\Users\Admin\AppData\Local\Temp\qdcpqy.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\qdcpqy.exe"
                                                  5⤵
                                                    PID:1788
                                                  • C:\Users\Admin\AppData\Local\Temp\jysqzr.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\jysqzr.exe"
                                                    5⤵
                                                      PID:1568
                                                    • C:\Users\Admin\AppData\Local\Temp\oioets.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\oioets.exe"
                                                      5⤵
                                                        PID:1936
                                                      • C:\Users\Admin\AppData\Local\Temp\pfjgft.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\pfjgft.exe"
                                                        5⤵
                                                          PID:972
                                                        • C:\Users\Admin\AppData\Local\Temp\oghkno.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\oghkno.exe"
                                                          5⤵
                                                            PID:3820
                                                          • C:\Users\Admin\AppData\Local\Temp\mcwetv.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\mcwetv.exe"
                                                            5⤵
                                                              PID:4496
                                                            • C:\Users\Admin\AppData\Local\Temp\rigtdn.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\rigtdn.exe"
                                                              5⤵
                                                                PID:2800
                                                              • C:\Users\Admin\AppData\Local\Temp\aemvpf.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\aemvpf.exe"
                                                                5⤵
                                                                  PID:2524
                                                                • C:\Users\Admin\AppData\Local\Temp\pbqukk.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\pbqukk.exe"
                                                                  5⤵
                                                                  • Checks computer location settings
                                                                  • Drops startup file
                                                                  • Adds Run key to start application
                                                                  PID:4032
                                                                  • C:\Windows\System32\schtasks.exe
                                                                    "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "pbqukk" /tr "C:\Users\Admin\AppData\Roaming\pbqukk.exe"
                                                                    6⤵
                                                                    • Scheduled Task/Job: Scheduled Task
                                                                    PID:4672
                                                                  • C:\Users\Admin\AppData\Local\Temp\guxkni.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\guxkni.exe"
                                                                    6⤵
                                                                    • Checks computer location settings
                                                                    • Drops startup file
                                                                    • Adds Run key to start application
                                                                    PID:4680
                                                                    • C:\Windows\System32\schtasks.exe
                                                                      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "guxkni" /tr "C:\Users\Admin\AppData\Roaming\guxkni.exe"
                                                                      7⤵
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:212
                                                                    • C:\Users\Admin\AppData\Local\Temp\ssddnk.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\ssddnk.exe"
                                                                      7⤵
                                                                      • Checks computer location settings
                                                                      • Drops startup file
                                                                      • Adds Run key to start application
                                                                      PID:3784
                                                                      • C:\Windows\System32\schtasks.exe
                                                                        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "ssddnk" /tr "C:\Users\Admin\AppData\Roaming\ssddnk.exe"
                                                                        8⤵
                                                                        • Scheduled Task/Job: Scheduled Task
                                                                        PID:3708
                                                                      • C:\Users\Admin\AppData\Local\Temp\xfohqy.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\xfohqy.exe"
                                                                        8⤵
                                                                          PID:3016
                                                                        • C:\Users\Admin\AppData\Local\Temp\juagln.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\juagln.exe"
                                                                          8⤵
                                                                            PID:4864
                                                                          • C:\Users\Admin\AppData\Local\Temp\btozfn.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\btozfn.exe"
                                                                            8⤵
                                                                              PID:4700
                                                                            • C:\Users\Admin\AppData\Local\Temp\kvkyvj.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\kvkyvj.exe"
                                                                              8⤵
                                                                                PID:4664
                                                                            • C:\Users\Admin\AppData\Local\Temp\gyrwdx.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\gyrwdx.exe"
                                                                              7⤵
                                                                                PID:1512
                                                                              • C:\Users\Admin\AppData\Local\Temp\jlokgr.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\jlokgr.exe"
                                                                                7⤵
                                                                                  PID:1516
                                                                                • C:\Users\Admin\AppData\Local\Temp\fljjii.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\fljjii.exe"
                                                                                  7⤵
                                                                                    PID:4928
                                                                                  • C:\Users\Admin\AppData\Local\Temp\jumknu.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\jumknu.exe"
                                                                                    7⤵
                                                                                      PID:4952
                                                                                    • C:\Users\Admin\AppData\Local\Temp\aplgfy.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\aplgfy.exe"
                                                                                      7⤵
                                                                                        PID:4200
                                                                                    • C:\Users\Admin\AppData\Local\Temp\fljlpc.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\fljlpc.exe"
                                                                                      6⤵
                                                                                        PID:4244
                                                                                      • C:\Users\Admin\AppData\Local\Temp\fgxdra.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\fgxdra.exe"
                                                                                        6⤵
                                                                                          PID:1168
                                                                                        • C:\Users\Admin\AppData\Local\Temp\lcldab.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\lcldab.exe"
                                                                                          6⤵
                                                                                            PID:1816
                                                                                          • C:\Users\Admin\AppData\Local\Temp\mtatnl.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\mtatnl.exe"
                                                                                            6⤵
                                                                                              PID:4544
                                                                                            • C:\Users\Admin\AppData\Local\Temp\gagkbq.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\gagkbq.exe"
                                                                                              6⤵
                                                                                                PID:4956
                                                                                              • C:\Users\Admin\AppData\Local\Temp\jliany.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\jliany.exe"
                                                                                                6⤵
                                                                                                  PID:2184
                                                                                                • C:\Users\Admin\AppData\Local\Temp\zwkdbm.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\zwkdbm.exe"
                                                                                                  6⤵
                                                                                                    PID:4092
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ixhzmp.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\ixhzmp.exe"
                                                                                                    6⤵
                                                                                                      PID:1400
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\lkxiak.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\lkxiak.exe"
                                                                                                    5⤵
                                                                                                      PID:3100
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\ryldew.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\ryldew.exe"
                                                                                                      5⤵
                                                                                                        PID:908
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\vjpsmk.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\vjpsmk.exe"
                                                                                                        5⤵
                                                                                                          PID:3112
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\mvbvfb.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\mvbvfb.exe"
                                                                                                          5⤵
                                                                                                            PID:4472
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\gtrbum.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\gtrbum.exe"
                                                                                                            5⤵
                                                                                                              PID:400
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\yrsmtj.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\yrsmtj.exe"
                                                                                                              5⤵
                                                                                                                PID:2532
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\xjiwbe.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\xjiwbe.exe"
                                                                                                                5⤵
                                                                                                                  PID:2916
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\cwaqaf.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\cwaqaf.exe"
                                                                                                                  5⤵
                                                                                                                    PID:1512
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\qxpfio.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\qxpfio.exe"
                                                                                                                    5⤵
                                                                                                                      PID:4876
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\ipewbh.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\ipewbh.exe"
                                                                                                                      5⤵
                                                                                                                        PID:4944
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\sqezfm.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\sqezfm.exe"
                                                                                                                        5⤵
                                                                                                                          PID:2640
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\vbaise.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\vbaise.exe"
                                                                                                                        4⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        PID:1336
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\hcwqcx.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\hcwqcx.exe"
                                                                                                                        4⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        PID:2200
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\phdyqq.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\phdyqq.exe"
                                                                                                                        4⤵
                                                                                                                          PID:1676
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ykkner.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\ykkner.exe"
                                                                                                                          4⤵
                                                                                                                            PID:2448
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ywicvh.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ywicvh.exe"
                                                                                                                            4⤵
                                                                                                                              PID:1028
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\mffgzh.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\mffgzh.exe"
                                                                                                                              4⤵
                                                                                                                                PID:1996
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\sbqylo.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\sbqylo.exe"
                                                                                                                                4⤵
                                                                                                                                  PID:3212
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\sldpgr.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\sldpgr.exe"
                                                                                                                                  4⤵
                                                                                                                                    PID:2192
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\gplhio.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\gplhio.exe"
                                                                                                                                    4⤵
                                                                                                                                      PID:2812
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\jhwjkv.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\jhwjkv.exe"
                                                                                                                                      4⤵
                                                                                                                                        PID:640
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\vfgpdw.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\vfgpdw.exe"
                                                                                                                                        4⤵
                                                                                                                                          PID:548
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\rjiwfo.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\rjiwfo.exe"
                                                                                                                                          4⤵
                                                                                                                                            PID:760
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\zazwvt.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\zazwvt.exe"
                                                                                                                                            4⤵
                                                                                                                                              PID:4108
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\njqqwg.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\njqqwg.exe"
                                                                                                                                              4⤵
                                                                                                                                                PID:3252
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\wexrwr.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\wexrwr.exe"
                                                                                                                                                4⤵
                                                                                                                                                  PID:64
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\kjrucf.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\kjrucf.exe"
                                                                                                                                                  4⤵
                                                                                                                                                    PID:4916
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\hcigxw.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\hcigxw.exe"
                                                                                                                                                    4⤵
                                                                                                                                                      PID:3488
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\jkjwhi.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\jkjwhi.exe"
                                                                                                                                                      4⤵
                                                                                                                                                        PID:3352
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\pmmdvb.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\pmmdvb.exe"
                                                                                                                                                        4⤵
                                                                                                                                                          PID:2484
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\fejaty.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\fejaty.exe"
                                                                                                                                                          4⤵
                                                                                                                                                            PID:2356
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\zzmqlw.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\zzmqlw.exe"
                                                                                                                                                            4⤵
                                                                                                                                                              PID:3044
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\xfxtos.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\xfxtos.exe"
                                                                                                                                                              4⤵
                                                                                                                                                              • Checks computer location settings
                                                                                                                                                              • Drops startup file
                                                                                                                                                              • Adds Run key to start application
                                                                                                                                                              PID:3684
                                                                                                                                                              • C:\Windows\System32\schtasks.exe
                                                                                                                                                                "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "xfxtos" /tr "C:\Users\Admin\AppData\Roaming\xfxtos.exe"
                                                                                                                                                                5⤵
                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                PID:3044
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\erymig.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\erymig.exe"
                                                                                                                                                                5⤵
                                                                                                                                                                  PID:2664
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\crlkze.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\crlkze.exe"
                                                                                                                                                                  5⤵
                                                                                                                                                                    PID:4224
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\munzuk.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\munzuk.exe"
                                                                                                                                                                    5⤵
                                                                                                                                                                      PID:3060
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\khlthm.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\khlthm.exe"
                                                                                                                                                                    4⤵
                                                                                                                                                                      PID:2420
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\xzxock.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\xzxock.exe"
                                                                                                                                                                      4⤵
                                                                                                                                                                        PID:4220
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\egoqpy.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\egoqpy.exe"
                                                                                                                                                                        4⤵
                                                                                                                                                                          PID:1260
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\ksnpff.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\ksnpff.exe"
                                                                                                                                                                        3⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                        PID:1008
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\itpdso.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\itpdso.exe"
                                                                                                                                                                        3⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                        PID:512
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\arosgg.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\arosgg.exe"
                                                                                                                                                                        3⤵
                                                                                                                                                                        • Checks computer location settings
                                                                                                                                                                        • Drops startup file
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • Adds Run key to start application
                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                                                                                        PID:2548
                                                                                                                                                                        • C:\Windows\System32\schtasks.exe
                                                                                                                                                                          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "arosgg" /tr "C:\Users\Admin\AppData\Roaming\arosgg.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                          PID:4868
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\kuukzy.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\kuukzy.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                          PID:4084
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\eixflv.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\eixflv.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                          PID:2532
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\zvpbqt.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\zvpbqt.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:2632
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\icpqjm.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\icpqjm.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                            PID:3220
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\gedtiq.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\gedtiq.exe"
                                                                                                                                                                            4⤵
                                                                                                                                                                              PID:1664
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\qtgwlt.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\qtgwlt.exe"
                                                                                                                                                                              4⤵
                                                                                                                                                                                PID:2320
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\wkfhdt.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\wkfhdt.exe"
                                                                                                                                                                                4⤵
                                                                                                                                                                                  PID:4588
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\lcubni.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\lcubni.exe"
                                                                                                                                                                                  4⤵
                                                                                                                                                                                    PID:3460
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\pdqrsg.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\pdqrsg.exe"
                                                                                                                                                                                    4⤵
                                                                                                                                                                                      PID:1396
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\zulhdv.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\zulhdv.exe"
                                                                                                                                                                                      4⤵
                                                                                                                                                                                        PID:3100
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\vkahor.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\vkahor.exe"
                                                                                                                                                                                        4⤵
                                                                                                                                                                                          PID:668
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\odjvfg.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\odjvfg.exe"
                                                                                                                                                                                          4⤵
                                                                                                                                                                                            PID:4432
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\obzvfh.exe
                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\obzvfh.exe"
                                                                                                                                                                                            4⤵
                                                                                                                                                                                              PID:4680
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\rfquee.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\rfquee.exe"
                                                                                                                                                                                              4⤵
                                                                                                                                                                                                PID:4668
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\zybawr.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\zybawr.exe"
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                  PID:2876
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\hogkls.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\hogkls.exe"
                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                    PID:464
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\sencmj.exe
                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\sencmj.exe"
                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                      PID:4984
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\ytykdq.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\ytykdq.exe"
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                        PID:3792
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\geoepy.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\geoepy.exe"
                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                          PID:2236
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\eagwhp.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\eagwhp.exe"
                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                            PID:4844
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\qogrnq.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\qogrnq.exe"
                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                              PID:4804
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\zephdb.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\zephdb.exe"
                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                PID:4432
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tpsgvk.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\tpsgvk.exe"
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                  PID:3372
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\fpvlts.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\fpvlts.exe"
                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                    PID:4124
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\cdyifk.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\cdyifk.exe"
                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                      PID:4760
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\lwwxmy.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\lwwxmy.exe"
                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                        PID:4340
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\myvjdp.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\myvjdp.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                      PID:3424
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\nhbdyk.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\nhbdyk.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                      PID:1648
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\heqoln.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\heqoln.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                      PID:1908
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\bzmden.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\bzmden.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      PID:1896
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\cslrzp.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\cslrzp.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:4424
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\pliorl.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\pliorl.exe"
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:5012
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\kaoxby.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\kaoxby.exe"
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                            PID:4868
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\devfvo.exe
                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\devfvo.exe"
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                              PID:2012
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ylfbrg.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\ylfbrg.exe"
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                PID:3352
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\uiuhgk.exe
                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\uiuhgk.exe"
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                  PID:1192
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\evhmom.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\evhmom.exe"
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                    PID:2204
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\btneek.exe
                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\btneek.exe"
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                      PID:464
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\ydxoaz.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\ydxoaz.exe"
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                        PID:3100
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\swxwtn.exe
                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\swxwtn.exe"
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                          PID:516
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\koucui.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\koucui.exe"
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                            PID:2360
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\rduetg.exe
                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\rduetg.exe"
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                              PID:4444
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\qrqjec.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\qrqjec.exe"
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:1320
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\athucn.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\athucn.exe"
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                  PID:3732
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\jgivpk.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\jgivpk.exe"
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                    PID:1000
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\nhcucz.exe
                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\nhcucz.exe"
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                      PID:4160
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\rzyenb.exe
                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\rzyenb.exe"
                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                        PID:684
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\qujryj.exe
                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\qujryj.exe"
                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                          PID:1348
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\iisuwz.exe
                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\iisuwz.exe"
                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                            PID:1500
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\fpmhso.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\fpmhso.exe"
                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                              PID:32
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\zvnkrm.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\zvnkrm.exe"
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                PID:4148
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\dvorsf.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\dvorsf.exe"
                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                  PID:2584
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\dvggdh.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\dvggdh.exe"
                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                    PID:1504
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\zouqst.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\zouqst.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:3772
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\vxfjoh.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\vxfjoh.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:3112
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\dvulev.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\dvulev.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:4272
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\qvjvvu.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\qvjvvu.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:380
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\wwkqig.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\wwkqig.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:1112
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ghmrar.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ghmrar.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:2788
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\nhtfgt.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\nhtfgt.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:2544
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\viyhdu.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\viyhdu.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:4672
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\uqekrm.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\uqekrm.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:1124
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\edtztw.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\edtztw.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:4912
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ifpzdh.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ifpzdh.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:1040
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\vludxw.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\vludxw.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  PID:4968
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\bkoqam.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\bkoqam.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                    PID:4792
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\wptqvr.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\wptqvr.exe"
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                      PID:2680
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\cvqznx.exe
                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\cvqznx.exe"
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                        PID:2852
                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\yooxwb.exe
                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\yooxwb.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                          PID:1276
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\evfrmr.exe
                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\evfrmr.exe"
                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                            PID:3360
                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\zrshig.exe
                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\zrshig.exe"
                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                              PID:4456
                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\yncgde.exe
                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\yncgde.exe"
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                PID:1360
                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\dsjxxh.exe
                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\dsjxxh.exe"
                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                  PID:2188
                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\qvywej.exe
                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\qvywej.exe"
                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                    PID:2248
                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ieonmf.exe
                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\ieonmf.exe"
                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                      PID:4584
                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\hecbqe.exe
                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\hecbqe.exe"
                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                        PID:2184
                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\yunjbz.exe
                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\yunjbz.exe"
                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                          PID:2552
                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\vsljue.exe
                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\vsljue.exe"
                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                            PID:1896
                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\sgyxaq.exe
                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\sgyxaq.exe"
                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                              PID:3172
                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\sdnjze.exe
                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\sdnjze.exe"
                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                PID:3372
                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\skawzy.exe
                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\skawzy.exe"
                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                  PID:1496
                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\bbbfyc.exe
                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\bbbfyc.exe"
                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                    PID:1104
                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\uhuyam.exe
                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\uhuyam.exe"
                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                      PID:1732
                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\xyjkuf.exe
                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\xyjkuf.exe"
                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                        PID:3168
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\hjdmjn.exe
                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\hjdmjn.exe"
                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                          PID:2916
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\rovirq.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\rovirq.exe"
                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                            PID:1504
                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\dmhvdt.exe
                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\dmhvdt.exe"
                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                              PID:4936
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\yysmit.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\yysmit.exe"
                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                PID:1680
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:1692
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:1624
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:552
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:788
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:5060
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\bifhio.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\bifhio.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:4620
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:2300
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\bifhio.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\bifhio.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:2384
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:3660
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\epvdkf.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\epvdkf.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:4932
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\epvdkf.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\epvdkf.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:3488
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:1940
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\bifhio.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\bifhio.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:980
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:4700
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\arosgg.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\arosgg.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:3144
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\arosgg.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\arosgg.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:4288
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\epvdkf.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\epvdkf.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:4984
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:752
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\bifhio.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\bifhio.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:400
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:4456
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ncxhyt.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\ncxhyt.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:4340
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\arosgg.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\arosgg.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:2860
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\epvdkf.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\epvdkf.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:2500
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:1524
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\bifhio.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\bifhio.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:1400
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ncxhyt.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\ncxhyt.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:1572
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:2608
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\arosgg.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\arosgg.exe
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                PID:412
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\epvdkf.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\epvdkf.exe
                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                  PID:1348
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                    PID:4764
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\bifhio.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\bifhio.exe
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                      PID:4988
                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\ncxhyt.exe
                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\ncxhyt.exe
                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                        PID:3660
                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                          PID:4936
                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\fjnapu.exe
                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\fjnapu.exe
                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                            PID:4536
                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\arosgg.exe
                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\arosgg.exe
                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                              PID:980
                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\epvdkf.exe
                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\epvdkf.exe
                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                PID:2360
                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                  PID:4628
                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\bifhio.exe
                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\bifhio.exe
                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                    PID:1936
                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\ncxhyt.exe
                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\ncxhyt.exe
                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                      PID:2704
                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                        PID:4848
                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\fjnapu.exe
                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\fjnapu.exe
                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                          PID:4100
                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\arosgg.exe
                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\arosgg.exe
                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                            PID:1548
                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\epvdkf.exe
                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\epvdkf.exe
                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                              PID:1212
                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                PID:1108
                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\bifhio.exe
                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\bifhio.exe
                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                  PID:1536
                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\ncxhyt.exe
                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\ncxhyt.exe
                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                    PID:628
                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                      PID:1780
                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\fjnapu.exe
                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\fjnapu.exe
                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                        PID:1496
                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\pbqukk.exe
                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\pbqukk.exe
                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                          PID:1820
                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\arosgg.exe
                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\arosgg.exe
                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                            PID:2056
                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\epvdkf.exe
                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\epvdkf.exe
                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                              PID:5036
                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                PID:3108
                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\bifhio.exe
                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\bifhio.exe
                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                  PID:4432
                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\ncxhyt.exe
                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\ncxhyt.exe
                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                    PID:1628
                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                      PID:1576
                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\pbqukk.exe
                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\pbqukk.exe
                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                        PID:3384
                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\fjnapu.exe
                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\fjnapu.exe
                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                          PID:1548
                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\guxkni.exe
                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\guxkni.exe
                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                            PID:624
                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\arosgg.exe
                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\arosgg.exe
                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                              PID:2236
                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\epvdkf.exe
                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\epvdkf.exe
                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                PID:1488
                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\guxkni.exe
                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\guxkni.exe
                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                  PID:516
                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                    PID:4516
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\bifhio.exe
                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\bifhio.exe
                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                      PID:1520
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\ncxhyt.exe
                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\ncxhyt.exe
                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                        PID:1980
                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                          PID:3140
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\pbqukk.exe
                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\pbqukk.exe
                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                            PID:1152
                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\fjnapu.exe
                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\fjnapu.exe
                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                              PID:1996
                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ssddnk.exe
                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\ssddnk.exe
                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                PID:4876
                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\arosgg.exe
                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\arosgg.exe
                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                  PID:3348
                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\epvdkf.exe
                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\epvdkf.exe
                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                    PID:3960
                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\guxkni.exe
                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\guxkni.exe
                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                      PID:3236
                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                        PID:2380
                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\bifhio.exe
                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\bifhio.exe
                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                          PID:1356
                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\ssddnk.exe
                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\ssddnk.exe
                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                            PID:3032
                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\ncxhyt.exe
                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\ncxhyt.exe
                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                              PID:4572
                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                PID:4244
                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\pbqukk.exe
                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\pbqukk.exe
                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                  PID:2556
                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\fjnapu.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\fjnapu.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                    PID:324
                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\xfxtos.exe
                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\xfxtos.exe
                                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:1832
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\arosgg.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\arosgg.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                        PID:1364
                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\xfxtos.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\xfxtos.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                          PID:4256
                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\epvdkf.exe
                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\epvdkf.exe
                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                            PID:3268
                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\guxkni.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\guxkni.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                              PID:2372
                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                PID:532
                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\bifhio.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\bifhio.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:4896
                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\ssddnk.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\ssddnk.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:4168
                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\ncxhyt.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\ncxhyt.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:4984
                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:3292
                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\pbqukk.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\pbqukk.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:4148
                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\fjnapu.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\fjnapu.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:3792
                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\arosgg.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\arosgg.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:3048
                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\xfxtos.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\xfxtos.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:2108
                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\epvdkf.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\epvdkf.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:944
                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\guxkni.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\guxkni.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:1496
                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\pvfafi.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:1908
                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\bifhio.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\bifhio.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:3640
                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\ssddnk.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\ssddnk.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:2740
                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\ncxhyt.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\ncxhyt.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:3744
                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:1816
                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\pbqukk.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\pbqukk.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:3100
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\fjnapu.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\fjnapu.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:4044

                                                                                                                                                                                                                                                                                                                                                                                                                                                                Network

                                                                                                                                                                                                                                                                                                                                                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                                                                                                                                                                                Replay Monitor

                                                                                                                                                                                                                                                                                                                                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                                                                                                                                                                                Downloads

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\15415145.exe.log

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  654B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2ff39f6c7249774be85fd60a8f9a245e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  684ff36b31aedc1e587c8496c02722c6698c1c4e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  944B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  77d622bb1a5b250869a3238b9bc1402b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d47f4003c2554b9dfc4c16f22460b331886b191b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  944B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  22310ad6749d8cc38284aa616efcd100

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  440ef4a0a53bfa7c83fe84326a1dff4326dcb515

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  55b1d8021c4eb4c3c0d75e3ed7a4eb30cd0123e3d69f32eeb596fe4ffec05abf

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2ef08e2ee15bb86695fe0c10533014ffed76ececc6e579d299d3365fafb7627f53e32e600bb6d872b9f58aca94f8cb7e1e94cdfd14777527f7f0aa019d9c6def

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fh2ikbbe.qax.ps1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  60B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\arosgg.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  156KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e2cf7cb958bda8d948e80bdb78d6e283

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  34c18cf619966914046b7a8f9070b0ee9ca0523d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  07f878b812dc294a61fb6030dffab309e4a05bef322759a198f110aa88c3b402

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3197a3a08069a2a33cea248503132dff4369efe6b83d13db61ef5be81e26f5c3f57ecba9c31e73754f321848dcf491f19eb0249f5f182c2332ae0879ed84b56c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\bifhio.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  159KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  49a6b6e8627762b929999b0b1fe6d604

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4a47bbb17c6cbda79794428df97d203b7261af79

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ca6aa52d419303376de2c37b4c8f6bdd41e31e55de6d178520ad5056303b6571

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c967dcb9be6b1fa73f1ef50a7785c17919365857be63923c6cad53362931d9a1c9fb41a43d68a050ad2a50239580fc8294e61e2ba10ee19d185f4f91c035b85b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\dmzjzt.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  30KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d8a05fae946f16dbb12d5489f2b68230

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f8068ceb85905539ed39dc4dc187088487b09e17

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7876b3d0721a40d4d80f873be9ff79e722e28bd24ba0ee9ab9faac5c7aa69899

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  661fc778e40c260756d928fe3bed91c3cbc8884ac27a071e1bf3c8f97c9133bd4bd853371baed477a3988305c12e1c405d03059f8652d810a23eb6050f6ade77

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\fjnapu.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  151KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5cdc9671612660bd34747c635218a649

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8cebfbdfc27689d9988d4512da7d855c13eb8e0b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  119b3e5a0b2aad4dc9a6a7376dde77e80826830a24a08aefd858710e79a11db9

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a33bfb9c9db6469274a38bee8038fa7a86b2e336e48776bee788b7b2b372556b5880253cdc7856339130ca8b29c199a739020e78ca29cc401f441e2ac18280ef

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\guxkni.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  161KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  760aa2ef40d31c55f0019cc916e9de48

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0228e46ca0a0303bebf54a65bf5da8111c4de402

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7ae58db4879d8daf291c5eab58ca9b49bc1b5c63153a02d175d83406a71a2806

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ce85a4af522b22d696ff98e176e2f97280363ac5e4161e39dac8cb0404af8d20fc4efe0ddd9e39cfa07bef28b65960c9a56822c6436b715f37ec6df9bd512d04

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ncxhyt.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  152KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c0a4054bc0a6553d3a246d91e6cdc95b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b8722a0cf5483539ce965098fb299ad129d1a36b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0c20402e4957de72ae5e6c5ce00d0dfab6a49affb260996b3290d44264977909

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5f5e88e876e6363992cd28794203874d27fc204bc7df004d32bfa18ebd0797c8c89ccb6b4cc44d4bdf6a9b476d5be5bec2a91bdc7020ba7b3628b98c9587ea5e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\pbqukk.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  161KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a2e166ef9ba63b78150b9e08767d0764

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  885c223c8436ee6184f6335f3bcf7bd761e85319

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0626693b0820897af0b56b9092439ce955a2435b610127d1686ea256eddc230f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  04651a2f9f4d648b95e7a5e67a1e1ddbaa12d8d2d1fecbf2da956b58826ad2f0aee2b1e182b1beab3f73215185f7c402df67fed4e0bcf401a2eea64ec34c627b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\pvfafi.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  34KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  950d739da650457fab6a225545794238

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e965286161ecda1b8c0072d8a2d80c191bb15705

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a571fcac5384158c4927e7c7cf07182b68eccf67845ba927beae44cd9835e3f8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b7b91343176c5a7f6408b21fbc96c23d0b02c080b846e29f304ba91de1d0f37a772953e7ab65d1d627cb3490fbef3b85681564e878d8dcda57c0897dbad1d19b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ssddnk.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  159KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c73cfd1942fdfaf5d6f3940ca42bbadd

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9c9424953c85d03daf296d7841577228d15e1884

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3d735b082f087b25561d293d17a6cda64326f3d48c1db53a2941ded1afc78773

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9d7ce397b67e704773f7a9ea6c9cd1e5345f2211a67ac5dd5f622118690ed295a18e763c47e5c208240f71d4bedb67ba1e869faff466602f8e97350f9df9495c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\wwkqig.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  166KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7a7586c1278ecdb7881a3b34f841b722

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8c991bb42729a7e34a096f9d3b23e7e0a25329a8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e2e527d70759106b6d1f479d0a1edd99d9b57c7fdfde2fffd1705e2161438a7f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  79ddd9f08587767ab6b2b66fa7873b0de9a51b8ee52abe8b9ed7e7cf9c42ddd3e45069e978bde40e1708c44a7d8c6a5c271e1dd7129501227dcd8dc5477872b2

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\xfxtos.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  158KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  eccccd69bbde41339441e5278f21bc10

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d1d96bfea61f93c10064417f3682bcebd682a7ad

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  69074dfb9990c949ae7238d95ff74d2cd294e54759ee1f087519aec081098541

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  edb20574c49e7495eef969113f3a38979b8ef85669da30de4c0e0632ea2467fc3e11ef62686e32b5c90d29e99abc66d5cdc97d5bc420f356eb04b72e71553dea

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  59KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6c091ad6fae0fa76f44870d1a1b05cb4

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  040f60c0ee3f4902f919025057e34ab4d11b1abd

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/216-0-0x00007FFF6A4A3000-0x00007FFF6A4A5000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/216-11-0x00007FFF6A4A0000-0x00007FFF6AF61000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/216-1-0x0000000000D60000-0x0000000000D76000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/216-10-0x00007FFF6A4A0000-0x00007FFF6AF61000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1692-16-0x00007FFF6A4A0000-0x00007FFF6AF61000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1692-14-0x00007FFF6A4A0000-0x00007FFF6AF61000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1920-114-0x0000000000E60000-0x0000000000E8E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2548-314-0x0000000000410000-0x000000000043E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2620-482-0x0000000000230000-0x000000000023E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/3132-391-0x00000000004A0000-0x00000000004CC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/3684-1730-0x0000000000C40000-0x0000000000C6E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/3784-1560-0x00000000008B0000-0x00000000008DE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4032-1153-0x0000000000E30000-0x0000000000E5E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4052-632-0x0000000000EB0000-0x0000000000EDC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4164-39-0x000001B7AEDA0000-0x000001B7AEDC2000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  136KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4532-28-0x00000000007D0000-0x00000000007DE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4680-1342-0x0000000000410000-0x000000000043E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4948-236-0x0000000000F50000-0x0000000000F80000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  192KB