Analysis

  • max time kernel
    898s
  • max time network
    902s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250217-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    06/03/2025, 18:12

General

  • Target

    15415145.exe

  • Size

    59KB

  • MD5

    6c091ad6fae0fa76f44870d1a1b05cb4

  • SHA1

    040f60c0ee3f4902f919025057e34ab4d11b1abd

  • SHA256

    c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

  • SHA512

    3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

  • SSDEEP

    1536:skyZtyUQ8sBkROLW+UzbTH3gfm2qt0OgSko7:skItfQ8sBkROUzbTQf+6OgK7

Malware Config

Extracted

Family

xworm

Version

3.1

C2

known-savage.gl.at.ply.gg:45116

association-lectures.gl.at.ply.gg:32463

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain
aes.plain

Signatures

  • Detect Xworm Payload 24 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 11 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 22 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\15415145.exe
    "C:\Users\Admin\AppData\Local\Temp\15415145.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:464
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "15415145" /tr "C:\Users\Admin\AppData\Roaming\15415145.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:568
    • C:\Users\Admin\AppData\Local\Temp\ppbduv.exe
      "C:\Users\Admin\AppData\Local\Temp\ppbduv.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1136
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\ppbduv.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5028
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'ppbduv.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5084
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\ppbduv.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1428
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "ppbduv" /tr "C:\Users\Admin\AppData\Roaming\ppbduv.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2568
    • C:\Users\Admin\AppData\Local\Temp\otwebf.exe
      "C:\Users\Admin\AppData\Local\Temp\otwebf.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1872
    • C:\Users\Admin\AppData\Local\Temp\ahlczu.exe
      "C:\Users\Admin\AppData\Local\Temp\ahlczu.exe"
      2⤵
      • Executes dropped EXE
      PID:1056
    • C:\Users\Admin\AppData\Local\Temp\mdbhzb.exe
      "C:\Users\Admin\AppData\Local\Temp\mdbhzb.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:2060
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "mdbhzb" /tr "C:\Users\Admin\AppData\Roaming\mdbhzb.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4956
      • C:\Users\Admin\AppData\Local\Temp\ddnzzu.exe
        "C:\Users\Admin\AppData\Local\Temp\ddnzzu.exe"
        3⤵
        • Executes dropped EXE
        PID:4968
      • C:\Users\Admin\AppData\Local\Temp\ztfecf.exe
        "C:\Users\Admin\AppData\Local\Temp\ztfecf.exe"
        3⤵
        • Executes dropped EXE
        PID:2172
      • C:\Users\Admin\AppData\Local\Temp\jtfaxf.exe
        "C:\Users\Admin\AppData\Local\Temp\jtfaxf.exe"
        3⤵
        • Executes dropped EXE
        PID:1588
      • C:\Users\Admin\AppData\Local\Temp\wkayip.exe
        "C:\Users\Admin\AppData\Local\Temp\wkayip.exe"
        3⤵
        • Checks computer location settings
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of WriteProcessMemory
        PID:3176
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "wkayip" /tr "C:\Users\Admin\AppData\Roaming\wkayip.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:4620
        • C:\Users\Admin\AppData\Local\Temp\uoyauo.exe
          "C:\Users\Admin\AppData\Local\Temp\uoyauo.exe"
          4⤵
          • Executes dropped EXE
          PID:4892
        • C:\Users\Admin\AppData\Local\Temp\fegvwt.exe
          "C:\Users\Admin\AppData\Local\Temp\fegvwt.exe"
          4⤵
          • Executes dropped EXE
          PID:2104
        • C:\Users\Admin\AppData\Local\Temp\ctjqjg.exe
          "C:\Users\Admin\AppData\Local\Temp\ctjqjg.exe"
          4⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          PID:3800
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "ctjqjg" /tr "C:\Users\Admin\AppData\Roaming\ctjqjg.exe"
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:1664
          • C:\Users\Admin\AppData\Local\Temp\jiycko.exe
            "C:\Users\Admin\AppData\Local\Temp\jiycko.exe"
            5⤵
            • Executes dropped EXE
            PID:3624
          • C:\Users\Admin\AppData\Local\Temp\bxjxnd.exe
            "C:\Users\Admin\AppData\Local\Temp\bxjxnd.exe"
            5⤵
              PID:4404
            • C:\Users\Admin\AppData\Local\Temp\myarpn.exe
              "C:\Users\Admin\AppData\Local\Temp\myarpn.exe"
              5⤵
                PID:1000
              • C:\Users\Admin\AppData\Local\Temp\buyvht.exe
                "C:\Users\Admin\AppData\Local\Temp\buyvht.exe"
                5⤵
                  PID:3168
                • C:\Users\Admin\AppData\Local\Temp\hlioxn.exe
                  "C:\Users\Admin\AppData\Local\Temp\hlioxn.exe"
                  5⤵
                    PID:1680
                  • C:\Users\Admin\AppData\Local\Temp\glniit.exe
                    "C:\Users\Admin\AppData\Local\Temp\glniit.exe"
                    5⤵
                      PID:3432
                    • C:\Users\Admin\AppData\Local\Temp\kthtou.exe
                      "C:\Users\Admin\AppData\Local\Temp\kthtou.exe"
                      5⤵
                        PID:2780
                      • C:\Users\Admin\AppData\Local\Temp\tcvenu.exe
                        "C:\Users\Admin\AppData\Local\Temp\tcvenu.exe"
                        5⤵
                          PID:3992
                        • C:\Users\Admin\AppData\Local\Temp\ddyzwm.exe
                          "C:\Users\Admin\AppData\Local\Temp\ddyzwm.exe"
                          5⤵
                            PID:4700
                          • C:\Users\Admin\AppData\Local\Temp\xnafuy.exe
                            "C:\Users\Admin\AppData\Local\Temp\xnafuy.exe"
                            5⤵
                              PID:5000
                            • C:\Users\Admin\AppData\Local\Temp\gnzvqc.exe
                              "C:\Users\Admin\AppData\Local\Temp\gnzvqc.exe"
                              5⤵
                                PID:4952
                              • C:\Users\Admin\AppData\Local\Temp\qepghw.exe
                                "C:\Users\Admin\AppData\Local\Temp\qepghw.exe"
                                5⤵
                                  PID:1784
                                • C:\Users\Admin\AppData\Local\Temp\gifece.exe
                                  "C:\Users\Admin\AppData\Local\Temp\gifece.exe"
                                  5⤵
                                    PID:4148
                                  • C:\Users\Admin\AppData\Local\Temp\ydxnlu.exe
                                    "C:\Users\Admin\AppData\Local\Temp\ydxnlu.exe"
                                    5⤵
                                      PID:2220
                                    • C:\Users\Admin\AppData\Local\Temp\ohoalu.exe
                                      "C:\Users\Admin\AppData\Local\Temp\ohoalu.exe"
                                      5⤵
                                        PID:3588
                                      • C:\Users\Admin\AppData\Local\Temp\seyjnb.exe
                                        "C:\Users\Admin\AppData\Local\Temp\seyjnb.exe"
                                        5⤵
                                          PID:4696
                                        • C:\Users\Admin\AppData\Local\Temp\uxmsoj.exe
                                          "C:\Users\Admin\AppData\Local\Temp\uxmsoj.exe"
                                          5⤵
                                            PID:4032
                                          • C:\Users\Admin\AppData\Local\Temp\fwwcto.exe
                                            "C:\Users\Admin\AppData\Local\Temp\fwwcto.exe"
                                            5⤵
                                              PID:2936
                                            • C:\Users\Admin\AppData\Local\Temp\gslvgr.exe
                                              "C:\Users\Admin\AppData\Local\Temp\gslvgr.exe"
                                              5⤵
                                                PID:5004
                                              • C:\Users\Admin\AppData\Local\Temp\atcfgi.exe
                                                "C:\Users\Admin\AppData\Local\Temp\atcfgi.exe"
                                                5⤵
                                                  PID:4892
                                                • C:\Users\Admin\AppData\Local\Temp\npsunc.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\npsunc.exe"
                                                  5⤵
                                                    PID:3024
                                                  • C:\Users\Admin\AppData\Local\Temp\xwveje.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\xwveje.exe"
                                                    5⤵
                                                      PID:4760
                                                    • C:\Users\Admin\AppData\Local\Temp\sfooio.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\sfooio.exe"
                                                      5⤵
                                                        PID:4164
                                                      • C:\Users\Admin\AppData\Local\Temp\xmnats.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\xmnats.exe"
                                                        5⤵
                                                          PID:1896
                                                      • C:\Users\Admin\AppData\Local\Temp\wmvjif.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\wmvjif.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        PID:4464
                                                      • C:\Users\Admin\AppData\Local\Temp\oltcez.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\oltcez.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        PID:1088
                                                      • C:\Users\Admin\AppData\Local\Temp\ssstgj.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\ssstgj.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        PID:2104
                                                      • C:\Users\Admin\AppData\Local\Temp\jiyzjz.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\jiyzjz.exe"
                                                        4⤵
                                                          PID:4192
                                                        • C:\Users\Admin\AppData\Local\Temp\vyiuxk.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\vyiuxk.exe"
                                                          4⤵
                                                          • Checks computer location settings
                                                          • Drops startup file
                                                          • Adds Run key to start application
                                                          PID:1632
                                                          • C:\Windows\System32\schtasks.exe
                                                            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "vyiuxk" /tr "C:\Users\Admin\AppData\Roaming\vyiuxk.exe"
                                                            5⤵
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:4572
                                                          • C:\Users\Admin\AppData\Local\Temp\rmmhfp.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\rmmhfp.exe"
                                                            5⤵
                                                              PID:4036
                                                            • C:\Users\Admin\AppData\Local\Temp\skasfp.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\skasfp.exe"
                                                              5⤵
                                                                PID:2628
                                                              • C:\Users\Admin\AppData\Local\Temp\nfherh.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\nfherh.exe"
                                                                5⤵
                                                                  PID:3380
                                                                • C:\Users\Admin\AppData\Local\Temp\jlccaj.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\jlccaj.exe"
                                                                  5⤵
                                                                    PID:4216
                                                                  • C:\Users\Admin\AppData\Local\Temp\mcycxp.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\mcycxp.exe"
                                                                    5⤵
                                                                      PID:2780
                                                                    • C:\Users\Admin\AppData\Local\Temp\cjmtfr.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\cjmtfr.exe"
                                                                      5⤵
                                                                        PID:3824
                                                                      • C:\Users\Admin\AppData\Local\Temp\yonhdt.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\yonhdt.exe"
                                                                        5⤵
                                                                          PID:4860
                                                                        • C:\Users\Admin\AppData\Local\Temp\ucdvqq.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\ucdvqq.exe"
                                                                          5⤵
                                                                            PID:1420
                                                                          • C:\Users\Admin\AppData\Local\Temp\wyxcsu.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\wyxcsu.exe"
                                                                            5⤵
                                                                              PID:1668
                                                                            • C:\Users\Admin\AppData\Local\Temp\solcvd.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\solcvd.exe"
                                                                              5⤵
                                                                                PID:3148
                                                                              • C:\Users\Admin\AppData\Local\Temp\qpnlpw.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\qpnlpw.exe"
                                                                                5⤵
                                                                                  PID:1264
                                                                                • C:\Users\Admin\AppData\Local\Temp\dtzpfd.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\dtzpfd.exe"
                                                                                  5⤵
                                                                                    PID:416
                                                                                  • C:\Users\Admin\AppData\Local\Temp\uciihy.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\uciihy.exe"
                                                                                    5⤵
                                                                                      PID:4788
                                                                                    • C:\Users\Admin\AppData\Local\Temp\gqmigy.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\gqmigy.exe"
                                                                                      5⤵
                                                                                        PID:4296
                                                                                      • C:\Users\Admin\AppData\Local\Temp\saqsbr.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\saqsbr.exe"
                                                                                        5⤵
                                                                                          PID:3308
                                                                                        • C:\Users\Admin\AppData\Local\Temp\gwskqn.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\gwskqn.exe"
                                                                                          5⤵
                                                                                            PID:904
                                                                                          • C:\Users\Admin\AppData\Local\Temp\gjmgrw.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\gjmgrw.exe"
                                                                                            5⤵
                                                                                              PID:5020
                                                                                            • C:\Users\Admin\AppData\Local\Temp\qhtthq.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\qhtthq.exe"
                                                                                              5⤵
                                                                                                PID:2076
                                                                                            • C:\Users\Admin\AppData\Local\Temp\yefisb.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\yefisb.exe"
                                                                                              4⤵
                                                                                                PID:1508
                                                                                              • C:\Users\Admin\AppData\Local\Temp\ilftli.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\ilftli.exe"
                                                                                                4⤵
                                                                                                  PID:1416
                                                                                                • C:\Users\Admin\AppData\Local\Temp\udahde.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\udahde.exe"
                                                                                                  4⤵
                                                                                                    PID:3256
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\binzhb.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\binzhb.exe"
                                                                                                    4⤵
                                                                                                      PID:3656
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\iwcwnk.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\iwcwnk.exe"
                                                                                                      4⤵
                                                                                                        PID:2320
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\wunjez.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\wunjez.exe"
                                                                                                        4⤵
                                                                                                          PID:5096
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ujaqlu.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\ujaqlu.exe"
                                                                                                          4⤵
                                                                                                            PID:1508
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\epwpfg.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\epwpfg.exe"
                                                                                                            4⤵
                                                                                                              PID:1012
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\zouesp.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\zouesp.exe"
                                                                                                              4⤵
                                                                                                              • Checks computer location settings
                                                                                                              • Drops startup file
                                                                                                              • Adds Run key to start application
                                                                                                              PID:2320
                                                                                                              • C:\Windows\System32\schtasks.exe
                                                                                                                "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "zouesp" /tr "C:\Users\Admin\AppData\Roaming\zouesp.exe"
                                                                                                                5⤵
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:1916
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ngserz.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ngserz.exe"
                                                                                                                5⤵
                                                                                                                • Checks computer location settings
                                                                                                                • Drops startup file
                                                                                                                • Adds Run key to start application
                                                                                                                PID:3180
                                                                                                                • C:\Windows\System32\schtasks.exe
                                                                                                                  "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "ngserz" /tr "C:\Users\Admin\AppData\Roaming\ngserz.exe"
                                                                                                                  6⤵
                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                  PID:4772
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\itlbyk.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\itlbyk.exe"
                                                                                                                  6⤵
                                                                                                                    PID:1496
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ebzcvs.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\ebzcvs.exe"
                                                                                                                    6⤵
                                                                                                                      PID:4640
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\selrim.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\selrim.exe"
                                                                                                                      6⤵
                                                                                                                        PID:4368
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\twzjmy.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\twzjmy.exe"
                                                                                                                        6⤵
                                                                                                                          PID:4708
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\dzbtyh.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\dzbtyh.exe"
                                                                                                                          6⤵
                                                                                                                            PID:4056
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vkemfs.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\vkemfs.exe"
                                                                                                                            6⤵
                                                                                                                              PID:3156
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\mtaueq.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\mtaueq.exe"
                                                                                                                            5⤵
                                                                                                                              PID:1472
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\itspwd.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\itspwd.exe"
                                                                                                                              5⤵
                                                                                                                                PID:3168
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\adeazw.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\adeazw.exe"
                                                                                                                                5⤵
                                                                                                                                • Checks computer location settings
                                                                                                                                • Drops startup file
                                                                                                                                • Adds Run key to start application
                                                                                                                                PID:4940
                                                                                                                                • C:\Windows\System32\schtasks.exe
                                                                                                                                  "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "adeazw" /tr "C:\Users\Admin\AppData\Roaming\adeazw.exe"
                                                                                                                                  6⤵
                                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                                  PID:2436
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tkhjyf.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\tkhjyf.exe"
                                                                                                                                  6⤵
                                                                                                                                  • Checks computer location settings
                                                                                                                                  • Drops startup file
                                                                                                                                  • Adds Run key to start application
                                                                                                                                  PID:1932
                                                                                                                                  • C:\Windows\System32\schtasks.exe
                                                                                                                                    "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "tkhjyf" /tr "C:\Users\Admin\AppData\Roaming\tkhjyf.exe"
                                                                                                                                    7⤵
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:3732
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\qygsyb.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\qygsyb.exe"
                                                                                                                                    7⤵
                                                                                                                                      PID:1752
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\fmwytt.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\fmwytt.exe"
                                                                                                                                      7⤵
                                                                                                                                        PID:1332
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\azrdll.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\azrdll.exe"
                                                                                                                                        7⤵
                                                                                                                                          PID:4892
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nfpvrc.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\nfpvrc.exe"
                                                                                                                                        6⤵
                                                                                                                                          PID:1172
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\qhbrjw.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\qhbrjw.exe"
                                                                                                                                          6⤵
                                                                                                                                            PID:540
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\aaactr.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\aaactr.exe"
                                                                                                                                            6⤵
                                                                                                                                              PID:2280
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\csmijt.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\csmijt.exe"
                                                                                                                                            5⤵
                                                                                                                                              PID:4284
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\haqwfa.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\haqwfa.exe"
                                                                                                                                              5⤵
                                                                                                                                                PID:5028
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\sljykh.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\sljykh.exe"
                                                                                                                                                5⤵
                                                                                                                                                  PID:2800
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\lwccyx.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\lwccyx.exe"
                                                                                                                                                  5⤵
                                                                                                                                                    PID:1020
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\rumyrb.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\rumyrb.exe"
                                                                                                                                                    5⤵
                                                                                                                                                      PID:2268
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\xzwdav.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\xzwdav.exe"
                                                                                                                                                    4⤵
                                                                                                                                                      PID:3232
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\zmxuxr.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\zmxuxr.exe"
                                                                                                                                                      4⤵
                                                                                                                                                        PID:1244
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\ulzamt.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\ulzamt.exe"
                                                                                                                                                        4⤵
                                                                                                                                                          PID:2648
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\dkxsur.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\dkxsur.exe"
                                                                                                                                                          4⤵
                                                                                                                                                            PID:4164
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\esrvxz.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\esrvxz.exe"
                                                                                                                                                            4⤵
                                                                                                                                                              PID:2224
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\prbyle.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\prbyle.exe"
                                                                                                                                                              4⤵
                                                                                                                                                                PID:3236
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\cqjery.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\cqjery.exe"
                                                                                                                                                                4⤵
                                                                                                                                                                  PID:3220
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\xjsfut.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\xjsfut.exe"
                                                                                                                                                                  4⤵
                                                                                                                                                                    PID:1156
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\hybbai.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\hybbai.exe"
                                                                                                                                                                    4⤵
                                                                                                                                                                      PID:2280
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\reefzh.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\reefzh.exe"
                                                                                                                                                                      4⤵
                                                                                                                                                                        PID:3780
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\ddpyff.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\ddpyff.exe"
                                                                                                                                                                        4⤵
                                                                                                                                                                          PID:2344
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\coxihj.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\coxihj.exe"
                                                                                                                                                                        3⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        PID:924
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\klveod.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\klveod.exe"
                                                                                                                                                                        3⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        PID:3420
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\imyvqs.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\imyvqs.exe"
                                                                                                                                                                        3⤵
                                                                                                                                                                        • Checks computer location settings
                                                                                                                                                                        • Drops startup file
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • Adds Run key to start application
                                                                                                                                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                                                                                        PID:4484
                                                                                                                                                                        • C:\Windows\System32\schtasks.exe
                                                                                                                                                                          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "imyvqs" /tr "C:\Users\Admin\AppData\Roaming\imyvqs.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                          PID:1548
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\locmkr.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\locmkr.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:4080
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\lvteqa.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\lvteqa.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:2420
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\jekgqx.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\jekgqx.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:1428
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\jnwvvp.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\jnwvvp.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                            PID:1120
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\wnsnbg.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\wnsnbg.exe"
                                                                                                                                                                            4⤵
                                                                                                                                                                              PID:5024
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\cbpuzm.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\cbpuzm.exe"
                                                                                                                                                                              4⤵
                                                                                                                                                                                PID:4764
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\arqhde.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\arqhde.exe"
                                                                                                                                                                                4⤵
                                                                                                                                                                                  PID:3780
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\vmxrhx.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\vmxrhx.exe"
                                                                                                                                                                                  4⤵
                                                                                                                                                                                    PID:2688
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\dytinw.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\dytinw.exe"
                                                                                                                                                                                    4⤵
                                                                                                                                                                                      PID:1432
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\fptmpw.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\fptmpw.exe"
                                                                                                                                                                                      4⤵
                                                                                                                                                                                        PID:192
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\yxtmbo.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\yxtmbo.exe"
                                                                                                                                                                                        4⤵
                                                                                                                                                                                          PID:4232
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\kpexfz.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\kpexfz.exe"
                                                                                                                                                                                          4⤵
                                                                                                                                                                                            PID:1576
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\gbkrai.exe
                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\gbkrai.exe"
                                                                                                                                                                                            4⤵
                                                                                                                                                                                              PID:2996
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\sfgvkc.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\sfgvkc.exe"
                                                                                                                                                                                              4⤵
                                                                                                                                                                                                PID:2384
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\nuospj.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\nuospj.exe"
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                  PID:4508
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\snbuif.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\snbuif.exe"
                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                    PID:3508
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\kjkigr.exe
                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\kjkigr.exe"
                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                      PID:456
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\sfstbl.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\sfstbl.exe"
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                        PID:3128
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\mnpktk.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\mnpktk.exe"
                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                          PID:4592
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\qdnrzg.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\qdnrzg.exe"
                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                            PID:4340
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\asaues.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\asaues.exe"
                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                              PID:3084
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\xmtehr.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\xmtehr.exe"
                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                PID:3228
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ykyoce.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ykyoce.exe"
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                  PID:3804
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\jttdgb.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\jttdgb.exe"
                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                    PID:4540
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\uitrde.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\uitrde.exe"
                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                      PID:4612
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\rtkeio.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\rtkeio.exe"
                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                        PID:1052
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\awoxhm.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\awoxhm.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      PID:3236
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\edziri.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\edziri.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      PID:1676
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\reuyxl.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\reuyxl.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      PID:3080
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\wqmwtr.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\wqmwtr.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      PID:1880
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\jffcrl.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\jffcrl.exe"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:1680
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\hauiyl.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\hauiyl.exe"
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:1568
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\behked.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\behked.exe"
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                            PID:4956
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\kctnnj.exe
                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\kctnnj.exe"
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                              PID:1428
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ikomzz.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\ikomzz.exe"
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                PID:1944
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\fddxoc.exe
                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\fddxoc.exe"
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                  PID:852
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\hbmoar.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\hbmoar.exe"
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                    PID:4768
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\oifjwt.exe
                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\oifjwt.exe"
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                      PID:4748
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\dllimq.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\dllimq.exe"
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                        PID:1976
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\xwrvth.exe
                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\xwrvth.exe"
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                          PID:4352
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\wvbucu.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\wvbucu.exe"
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                            PID:4684
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ieqfdc.exe
                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ieqfdc.exe"
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                              PID:3272
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\rwccyf.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\rwccyf.exe"
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:1744
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\dznvin.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\dznvin.exe"
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                  PID:1120
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\nxrmzs.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\nxrmzs.exe"
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                    PID:3076
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\klhfrf.exe
                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\klhfrf.exe"
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                      PID:1168
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\quflas.exe
                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\quflas.exe"
                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                        PID:2896
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\cyijqp.exe
                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\cyijqp.exe"
                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                          PID:4956
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ouxlru.exe
                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\ouxlru.exe"
                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                            PID:2776
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tamngf.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\tamngf.exe"
                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                              PID:4000
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\dwexur.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\dwexur.exe"
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                PID:4692
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\umexme.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\umexme.exe"
                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                  PID:1340
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\zsyusj.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\zsyusj.exe"
                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                    PID:1012
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ukyljn.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ukyljn.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  PID:2876
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\nhfobc.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\nhfobc.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  PID:3004
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\jtdsui.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\jtdsui.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  PID:1516
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\lhuoon.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\lhuoon.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  PID:2448
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ukhkua.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ukhkua.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  PID:2168
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\qhqzjk.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\qhqzjk.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  PID:4228
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\xckjrt.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\xckjrt.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  PID:3820
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\zmfitf.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\zmfitf.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  PID:3032
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\qtjtwr.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\qtjtwr.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  PID:2032
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\gfvkqy.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\gfvkqy.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  PID:3948
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\gcnext.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\gcnext.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  PID:3032
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ljktvr.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ljktvr.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  PID:2336
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ybpboc.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ybpboc.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                    PID:1744
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\hlrbtb.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\hlrbtb.exe"
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                      PID:3332
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\rxlytd.exe
                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\rxlytd.exe"
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                        PID:3652
                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\pmmldo.exe
                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\pmmldo.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                          PID:1500
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\gvomwj.exe
                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\gvomwj.exe"
                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                            PID:4032
                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\uxysuu.exe
                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\uxysuu.exe"
                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                              PID:3820
                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\bfrtde.exe
                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\bfrtde.exe"
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                PID:4552
                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\heimnz.exe
                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\heimnz.exe"
                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                  PID:940
                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\hmqhej.exe
                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\hmqhej.exe"
                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                    PID:1984
                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\fnybvt.exe
                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\fnybvt.exe"
                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                      PID:2028
                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\nuphhw.exe
                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\nuphhw.exe"
                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                        PID:4392
                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\czdrwn.exe
                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\czdrwn.exe"
                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                          PID:4636
                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\mvihdz.exe
                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\mvihdz.exe"
                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                            PID:2056
                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\guhoej.exe
                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\guhoej.exe"
                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                              PID:2504
                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\tntomh.exe
                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\tntomh.exe"
                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                PID:1912
                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\wakxfi.exe
                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\wakxfi.exe"
                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                  PID:4876
                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\pzxmjo.exe
                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\pzxmjo.exe"
                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                    PID:1420
                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\wqpcvi.exe
                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\wqpcvi.exe"
                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                      PID:1132
                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\bxjzva.exe
                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\bxjzva.exe"
                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                        PID:3368
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\myqfot.exe
                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\myqfot.exe"
                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                          PID:4632
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\domvvw.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\domvvw.exe"
                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                            PID:2436
                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\doqzre.exe
                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\doqzre.exe"
                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                              PID:820
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\buksso.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\buksso.exe"
                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                PID:2820
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                              PID:3844
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:4244
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ppbduv.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\ppbduv.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:1784
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ppbduv.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\ppbduv.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:5060
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:2416
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\mdbhzb.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\mdbhzb.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:2276
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ppbduv.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\ppbduv.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:2832
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\mdbhzb.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\mdbhzb.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:888
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:5008
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\wkayip.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\wkayip.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:1108
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ppbduv.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\ppbduv.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:880
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\mdbhzb.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\mdbhzb.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:1420
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:3780
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\wkayip.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\wkayip.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:1848
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\imyvqs.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\imyvqs.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:64
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ppbduv.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\ppbduv.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:2400
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\imyvqs.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\imyvqs.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:4696
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\mdbhzb.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\mdbhzb.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:3616
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:2704
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\wkayip.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\wkayip.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:3228
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ctjqjg.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\ctjqjg.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:440
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ctjqjg.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\ctjqjg.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:2996
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ppbduv.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\ppbduv.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:3064
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\imyvqs.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\imyvqs.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:3948
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\mdbhzb.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\mdbhzb.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:2628
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:2820
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\wkayip.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\wkayip.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                              PID:2576
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ctjqjg.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\ctjqjg.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                PID:3124
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\ppbduv.exe
                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\ppbduv.exe"
                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                  PID:4492
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\imyvqs.exe
                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\imyvqs.exe"
                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                    PID:2384
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\mdbhzb.exe
                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\mdbhzb.exe"
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                      PID:3164
                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                        PID:2532
                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\wkayip.exe
                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\wkayip.exe"
                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                          PID:3792
                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\vyiuxk.exe
                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\vyiuxk.exe"
                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                            PID:4464
                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\vyiuxk.exe
                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\vyiuxk.exe"
                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                              PID:2868
                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ctjqjg.exe
                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\ctjqjg.exe"
                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                PID:3752
                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\ppbduv.exe
                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\ppbduv.exe"
                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                  PID:1340
                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\imyvqs.exe
                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\imyvqs.exe"
                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                    PID:3424
                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\mdbhzb.exe
                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\mdbhzb.exe"
                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                      PID:324
                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                        PID:3188
                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\wkayip.exe
                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\wkayip.exe"
                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                          PID:2384
                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\vyiuxk.exe
                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\vyiuxk.exe"
                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                            PID:4528
                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\ctjqjg.exe
                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\ctjqjg.exe"
                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                              PID:4772
                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ppbduv.exe
                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\ppbduv.exe"
                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                PID:1612
                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\imyvqs.exe
                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\imyvqs.exe"
                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                  PID:3396
                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\mdbhzb.exe
                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\mdbhzb.exe"
                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                    PID:4032
                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                      PID:2416
                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\wkayip.exe
                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\wkayip.exe"
                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                        PID:1712
                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\zouesp.exe
                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\zouesp.exe"
                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                          PID:824
                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\vyiuxk.exe
                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\vyiuxk.exe"
                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                            PID:2104
                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\ctjqjg.exe
                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\ctjqjg.exe"
                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                              PID:1072
                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ppbduv.exe
                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\ppbduv.exe"
                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                PID:696
                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\mdbhzb.exe
                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\mdbhzb.exe"
                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                  PID:3772
                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\imyvqs.exe
                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\imyvqs.exe"
                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                    PID:4624
                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                      PID:3856
                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\zouesp.exe
                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\zouesp.exe"
                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                        PID:3524
                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\wkayip.exe
                                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\wkayip.exe"
                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                          PID:3652
                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\ngserz.exe
                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\ngserz.exe"
                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                            PID:2588
                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\vyiuxk.exe
                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\vyiuxk.exe"
                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                              PID:1052
                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ctjqjg.exe
                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\ctjqjg.exe"
                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                PID:1516
                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\ppbduv.exe
                                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\ppbduv.exe"
                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                  PID:2104
                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\imyvqs.exe
                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\imyvqs.exe"
                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                    PID:4380
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\mdbhzb.exe
                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\mdbhzb.exe"
                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                      PID:3976
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                        PID:3064
                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\zouesp.exe
                                                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\zouesp.exe"
                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                          PID:4076
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\wkayip.exe
                                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\wkayip.exe"
                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                            PID:3420
                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\ngserz.exe
                                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\ngserz.exe"
                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                              PID:1000
                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\adeazw.exe
                                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\adeazw.exe"
                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                PID:3772
                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\vyiuxk.exe
                                                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\vyiuxk.exe"
                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                  PID:1756
                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\ctjqjg.exe
                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\ctjqjg.exe"
                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                    PID:3008
                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\adeazw.exe
                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\adeazw.exe"
                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                      PID:3884
                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\ppbduv.exe
                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\ppbduv.exe"
                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                        PID:3080
                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\imyvqs.exe
                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\imyvqs.exe"
                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                          PID:3488
                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\mdbhzb.exe
                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\mdbhzb.exe"
                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                            PID:3084
                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                              PID:4212
                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\zouesp.exe
                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\zouesp.exe"
                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                PID:3572
                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\wkayip.exe
                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\wkayip.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3308
                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\ngserz.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\ngserz.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                    PID:2732
                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\tkhjyf.exe
                                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\tkhjyf.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:1508
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\vyiuxk.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\vyiuxk.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                        PID:2120
                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\adeazw.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\adeazw.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                          PID:4812
                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\ctjqjg.exe
                                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\ctjqjg.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                            PID:4992
                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\ppbduv.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\ppbduv.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                              PID:4880
                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\imyvqs.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\imyvqs.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                PID:2744
                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\mdbhzb.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\mdbhzb.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:1740
                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:1116
                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\zouesp.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\zouesp.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:1092
                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\wkayip.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\wkayip.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:2412
                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\ngserz.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\ngserz.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:4368
                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\tkhjyf.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\tkhjyf.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:2932
                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\vyiuxk.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\vyiuxk.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:3456
                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ctjqjg.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\ctjqjg.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:636
                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\adeazw.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\adeazw.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:696
                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\ppbduv.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\ppbduv.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:4588
                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\mdbhzb.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\mdbhzb.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:1944
                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\imyvqs.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\imyvqs.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:1948
                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:2868
                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\zouesp.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\zouesp.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:4976
                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\wkayip.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\wkayip.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:2432
                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ngserz.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\ngserz.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:3144
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\tkhjyf.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\tkhjyf.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3196

                                                                                                                                                                                                                                                                                                                                                                                                                                                                Network

                                                                                                                                                                                                                                                                                                                                                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                                                                                                                                                                                Replay Monitor

                                                                                                                                                                                                                                                                                                                                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                                                                                                                                                                                Downloads

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\15415145.exe.log

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  654B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  11c6e74f0561678d2cf7fc075a6cc00c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  535ee79ba978554abcb98c566235805e7ea18490

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d39a78fabca39532fcb85ce908781a75132e1bd01cc50a3b290dd87127837d63

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  32c63d67bf512b42e7f57f71287b354200126cb417ef9d869c72e0b9388a7c2f5e3b61f303f1353baa1bf482d0f17e06e23c9f50b2f1babd4d958b6da19c40b0

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3eb3833f769dd890afc295b977eab4b4

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e857649b037939602c72ad003e5d3698695f436f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6a807b1c91ac66f33f88a787d64904c1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  83c554c7de04a8115c9005709e5cd01fca82c5d3

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  155314c1c86d8d4e5b802f1eef603c5dd4a2f7c949f069a38af5ba4959bd8256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  29f2d9f30fc081e7fe6e9fb772c810c9be0422afdc6aff5a286f49a990ededebcf0d083798c2d9f41ad8434393c6d0f5fa6df31226d9c3511ba2a41eb4a65200

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3caf917b1ebfa78eb8b14105254e1620

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  03f062b326fc4b5e28b5bf3a30ef6c43d114ca66

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  84ea2570cb450ef442ddc7874aa109174711280e6eae41eed67db35f155bb006

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  07f408a7660a3d22d61b4597c16a095c2ad395b8376bb4b92edc61ca73559d92be3ef45d5a34f19b30b4f79e5e7e74e71c84fd5c43f84d4704b75fb643d11bac

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_q0lj4pot.2n0.ps1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  60B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\adeazw.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  159KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c73cfd1942fdfaf5d6f3940ca42bbadd

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9c9424953c85d03daf296d7841577228d15e1884

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3d735b082f087b25561d293d17a6cda64326f3d48c1db53a2941ded1afc78773

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9d7ce397b67e704773f7a9ea6c9cd1e5345f2211a67ac5dd5f622118690ed295a18e763c47e5c208240f71d4bedb67ba1e869faff466602f8e97350f9df9495c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ctjqjg.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  152KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c0a4054bc0a6553d3a246d91e6cdc95b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b8722a0cf5483539ce965098fb299ad129d1a36b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0c20402e4957de72ae5e6c5ce00d0dfab6a49affb260996b3290d44264977909

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5f5e88e876e6363992cd28794203874d27fc204bc7df004d32bfa18ebd0797c8c89ccb6b4cc44d4bdf6a9b476d5be5bec2a91bdc7020ba7b3628b98c9587ea5e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\imyvqs.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  156KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e2cf7cb958bda8d948e80bdb78d6e283

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  34c18cf619966914046b7a8f9070b0ee9ca0523d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  07f878b812dc294a61fb6030dffab309e4a05bef322759a198f110aa88c3b402

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3197a3a08069a2a33cea248503132dff4369efe6b83d13db61ef5be81e26f5c3f57ecba9c31e73754f321848dcf491f19eb0249f5f182c2332ae0879ed84b56c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\mdbhzb.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  159KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  49a6b6e8627762b929999b0b1fe6d604

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4a47bbb17c6cbda79794428df97d203b7261af79

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ca6aa52d419303376de2c37b4c8f6bdd41e31e55de6d178520ad5056303b6571

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c967dcb9be6b1fa73f1ef50a7785c17919365857be63923c6cad53362931d9a1c9fb41a43d68a050ad2a50239580fc8294e61e2ba10ee19d185f4f91c035b85b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ngserz.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  161KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  760aa2ef40d31c55f0019cc916e9de48

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0228e46ca0a0303bebf54a65bf5da8111c4de402

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7ae58db4879d8daf291c5eab58ca9b49bc1b5c63153a02d175d83406a71a2806

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ce85a4af522b22d696ff98e176e2f97280363ac5e4161e39dac8cb0404af8d20fc4efe0ddd9e39cfa07bef28b65960c9a56822c6436b715f37ec6df9bd512d04

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\oltcez.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  30KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d8a05fae946f16dbb12d5489f2b68230

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f8068ceb85905539ed39dc4dc187088487b09e17

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7876b3d0721a40d4d80f873be9ff79e722e28bd24ba0ee9ab9faac5c7aa69899

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  661fc778e40c260756d928fe3bed91c3cbc8884ac27a071e1bf3c8f97c9133bd4bd853371baed477a3988305c12e1c405d03059f8652d810a23eb6050f6ade77

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ppbduv.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  34KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  950d739da650457fab6a225545794238

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e965286161ecda1b8c0072d8a2d80c191bb15705

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a571fcac5384158c4927e7c7cf07182b68eccf67845ba927beae44cd9835e3f8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b7b91343176c5a7f6408b21fbc96c23d0b02c080b846e29f304ba91de1d0f37a772953e7ab65d1d627cb3490fbef3b85681564e878d8dcda57c0897dbad1d19b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tkhjyf.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  158KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  eccccd69bbde41339441e5278f21bc10

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d1d96bfea61f93c10064417f3682bcebd682a7ad

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  69074dfb9990c949ae7238d95ff74d2cd294e54759ee1f087519aec081098541

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  edb20574c49e7495eef969113f3a38979b8ef85669da30de4c0e0632ea2467fc3e11ef62686e32b5c90d29e99abc66d5cdc97d5bc420f356eb04b72e71553dea

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\vyiuxk.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  151KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5cdc9671612660bd34747c635218a649

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8cebfbdfc27689d9988d4512da7d855c13eb8e0b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  119b3e5a0b2aad4dc9a6a7376dde77e80826830a24a08aefd858710e79a11db9

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a33bfb9c9db6469274a38bee8038fa7a86b2e336e48776bee788b7b2b372556b5880253cdc7856339130ca8b29c199a739020e78ca29cc401f441e2ac18280ef

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\wkayip.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  166KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7a7586c1278ecdb7881a3b34f841b722

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8c991bb42729a7e34a096f9d3b23e7e0a25329a8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e2e527d70759106b6d1f479d0a1edd99d9b57c7fdfde2fffd1705e2161438a7f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  79ddd9f08587767ab6b2b66fa7873b0de9a51b8ee52abe8b9ed7e7cf9c42ddd3e45069e978bde40e1708c44a7d8c6a5c271e1dd7129501227dcd8dc5477872b2

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\zouesp.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  161KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a2e166ef9ba63b78150b9e08767d0764

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  885c223c8436ee6184f6335f3bcf7bd761e85319

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0626693b0820897af0b56b9092439ce955a2435b610127d1686ea256eddc230f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  04651a2f9f4d648b95e7a5e67a1e1ddbaa12d8d2d1fecbf2da956b58826ad2f0aee2b1e182b1beab3f73215185f7c402df67fed4e0bcf401a2eea64ec34c627b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  59KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6c091ad6fae0fa76f44870d1a1b05cb4

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  040f60c0ee3f4902f919025057e34ab4d11b1abd

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/464-12-0x00007FFA55950000-0x00007FFA56412000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/464-11-0x00007FFA55953000-0x00007FFA55955000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/464-10-0x00007FFA55950000-0x00007FFA56412000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/464-0-0x00007FFA55953000-0x00007FFA55955000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/464-1-0x0000000000830000-0x0000000000846000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  88KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1088-581-0x0000000000650000-0x000000000065E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1136-32-0x00000000009A0000-0x00000000009AE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1632-774-0x00000000008A0000-0x00000000008CC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1932-2189-0x00000000001A0000-0x00000000001CE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2060-127-0x0000000000A80000-0x0000000000AAE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2320-1447-0x00000000005E0000-0x000000000060E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/3176-263-0x00000000008F0000-0x0000000000920000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/3180-1689-0x00000000008B0000-0x00000000008DE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/3800-465-0x0000000000FB0000-0x0000000000FDC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/3844-17-0x00007FFA55950000-0x00007FFA56412000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/3844-15-0x00007FFA55950000-0x00007FFA56412000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4484-382-0x0000000000080000-0x00000000000AE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4940-1983-0x0000000000770000-0x000000000079E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/5028-39-0x000001CE6D340000-0x000001CE6D362000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  136KB