Analysis

  • max time kernel
    11s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    30/03/2025, 06:37

General

  • Target

    JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe

  • Size

    1.4MB

  • MD5

    98513d260023a0cb3667f2e8dac81c4f

  • SHA1

    189be40083f151d30b3c588accdc23ea6c2f5075

  • SHA256

    2925a43bce9b41922ab001e421806ef21ae443d4f1eda68639a9b155d5dfb29e

  • SHA512

    6eb37009bd8f8145ad9378c87605a6f0195ceed56213bc7d17bef6a78ef6889900442b8f38fb9bd44f780beaa7d7e328b51a2885c141414810a91f0d930a3f27

  • SSDEEP

    24576:TQ7ceaRuHmGB7h+4E42P/M2euPuKpxLD2DgDQj9VEH2nyYtLDwI9T9aA/gfsc5E+:6g0Jl+4E42c2euWKpxLD2UDG9Ve2yuIp

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 11 IoCs
  • Drops file in System32 directory 10 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\fcxoa.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2640
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2452
      • C:\Windows\SysWOW64\pazthev.exe
        C:\Windows\system32\pazthev.exe 460 "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2840
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\bgsls.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2436
        • C:\Windows\SysWOW64\pazthev.exe
          C:\Windows\SysWOW64\pazthev.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3036
          • C:\Windows\SysWOW64\uortpve.exe
            C:\Windows\system32\uortpve.exe 452 "C:\Windows\SysWOW64\pazthev.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2848
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\xvbif.bat" "
              6⤵
              • System Location Discovery: System Language Discovery
              PID:3060
            • C:\Windows\SysWOW64\uortpve.exe
              C:\Windows\SysWOW64\uortpve.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:648
              • C:\Windows\SysWOW64\azporer.exe
                C:\Windows\system32\azporer.exe 452 "C:\Windows\SysWOW64\uortpve.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2564
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\geajq.bat" "
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3056
                • C:\Windows\SysWOW64\azporer.exe
                  C:\Windows\SysWOW64\azporer.exe
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  PID:2216
                  • C:\Windows\SysWOW64\hzmzggk.exe
                    C:\Windows\system32\hzmzggk.exe 452 "C:\Windows\SysWOW64\azporer.exe"
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    PID:1160
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c ""C:\Users\Admin\AppData\Local\Temp\nenwv.bat" "
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:1660
                    • C:\Windows\SysWOW64\hzmzggk.exe
                      C:\Windows\SysWOW64\hzmzggk.exe
                      10⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      PID:632
                      • C:\Windows\SysWOW64\pcjbalx.exe
                        C:\Windows\system32\pcjbalx.exe 452 "C:\Windows\SysWOW64\hzmzggk.exe"
                        11⤵
                        • Executes dropped EXE
                        PID:2320
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\pexfq.bat" "
                          12⤵
                            PID:1708
                          • C:\Windows\SysWOW64\pcjbalx.exe
                            C:\Windows\SysWOW64\pcjbalx.exe
                            12⤵
                              PID:908
                              • C:\Windows\SysWOW64\vvomwyy.exe
                                C:\Windows\system32\vvomwyy.exe 452 "C:\Windows\SysWOW64\pcjbalx.exe"
                                13⤵
                                  PID:2100
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\ycsay.bat" "
                                    14⤵
                                      PID:1464
                                    • C:\Windows\SysWOW64\vvomwyy.exe
                                      C:\Windows\SysWOW64\vvomwyy.exe
                                      14⤵
                                        PID:2104
                                        • C:\Windows\SysWOW64\efcncwz.exe
                                          C:\Windows\system32\efcncwz.exe 464 "C:\Windows\SysWOW64\vvomwyy.exe"
                                          15⤵
                                            PID:560
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c ""C:\Users\Admin\AppData\Local\Temp\avqdg.bat" "
                                              16⤵
                                                PID:2080
                                              • C:\Windows\SysWOW64\efcncwz.exe
                                                C:\Windows\SysWOW64\efcncwz.exe
                                                16⤵
                                                  PID:2380
                                                  • C:\Windows\SysWOW64\agtilxi.exe
                                                    C:\Windows\system32\agtilxi.exe 452 "C:\Windows\SysWOW64\efcncwz.exe"
                                                    17⤵
                                                      PID:1572
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\xxipc.bat" "
                                                        18⤵
                                                          PID:1752
                                                        • C:\Windows\SysWOW64\agtilxi.exe
                                                          C:\Windows\SysWOW64\agtilxi.exe
                                                          18⤵
                                                            PID:1628
                                                            • C:\Windows\SysWOW64\lmqlrav.exe
                                                              C:\Windows\system32\lmqlrav.exe 468 "C:\Windows\SysWOW64\agtilxi.exe"
                                                              19⤵
                                                                PID:2788
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\mvfbf.bat" "
                                                                  20⤵
                                                                    PID:2836
                                                                  • C:\Windows\SysWOW64\lmqlrav.exe
                                                                    C:\Windows\SysWOW64\lmqlrav.exe
                                                                    20⤵
                                                                      PID:2288
                                                                      • C:\Windows\SysWOW64\ujfdwyz.exe
                                                                        C:\Windows\system32\ujfdwyz.exe 520 "C:\Windows\SysWOW64\lmqlrav.exe"
                                                                        21⤵
                                                                          PID:2308
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            cmd /c ""C:\Users\Admin\AppData\Local\Temp\lacgf.bat" "
                                                                            22⤵
                                                                              PID:2912
                                                                            • C:\Windows\SysWOW64\ujfdwyz.exe
                                                                              C:\Windows\SysWOW64\ujfdwyz.exe
                                                                              22⤵
                                                                                PID:2548
                                                                                • C:\Windows\SysWOW64\uxorywk.exe
                                                                                  C:\Windows\system32\uxorywk.exe 452 "C:\Windows\SysWOW64\ujfdwyz.exe"
                                                                                  23⤵
                                                                                    PID:1596
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      cmd /c ""C:\Users\Admin\AppData\Local\Temp\yphcv.bat" "
                                                                                      24⤵
                                                                                        PID:2524
                                                                                      • C:\Windows\SysWOW64\uxorywk.exe
                                                                                        C:\Windows\SysWOW64\uxorywk.exe
                                                                                        24⤵
                                                                                          PID:2976
                                                                                          • C:\Windows\SysWOW64\rjkwrla.exe
                                                                                            C:\Windows\system32\rjkwrla.exe 476 "C:\Windows\SysWOW64\uxorywk.exe"
                                                                                            25⤵
                                                                                              PID:2536
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\vxeim.bat" "
                                                                                                26⤵
                                                                                                  PID:796
                                                                                                • C:\Windows\SysWOW64\rjkwrla.exe
                                                                                                  C:\Windows\SysWOW64\rjkwrla.exe
                                                                                                  26⤵
                                                                                                    PID:1112
                                                                                                    • C:\Windows\SysWOW64\csmmvwh.exe
                                                                                                      C:\Windows\system32\csmmvwh.exe 480 "C:\Windows\SysWOW64\rjkwrla.exe"
                                                                                                      27⤵
                                                                                                        PID:2108
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\emfkr.bat" "
                                                                                                          28⤵
                                                                                                            PID:1920
                                                                                                          • C:\Windows\SysWOW64\csmmvwh.exe
                                                                                                            C:\Windows\SysWOW64\csmmvwh.exe
                                                                                                            28⤵
                                                                                                              PID:1308
                                                                                                              • C:\Windows\SysWOW64\uspkucs.exe
                                                                                                                C:\Windows\system32\uspkucs.exe 452 "C:\Windows\SysWOW64\csmmvwh.exe"
                                                                                                                29⤵
                                                                                                                  PID:992
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\aucrj.bat" "
                                                                                                                    30⤵
                                                                                                                      PID:1252
                                                                                                                    • C:\Windows\SysWOW64\uspkucs.exe
                                                                                                                      C:\Windows\SysWOW64\uspkucs.exe
                                                                                                                      30⤵
                                                                                                                        PID:2388
                                                                                                                        • C:\Windows\SysWOW64\nuqzftd.exe
                                                                                                                          C:\Windows\system32\nuqzftd.exe 476 "C:\Windows\SysWOW64\uspkucs.exe"
                                                                                                                          31⤵
                                                                                                                            PID:976
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              cmd /c ""C:\Users\Admin\AppData\Local\Temp\mirok.bat" "
                                                                                                                              32⤵
                                                                                                                                PID:1680
                                                                                                                              • C:\Windows\SysWOW64\nuqzftd.exe
                                                                                                                                C:\Windows\SysWOW64\nuqzftd.exe
                                                                                                                                32⤵
                                                                                                                                  PID:1524
                                                                                                                                  • C:\Windows\SysWOW64\rohsyqf.exe
                                                                                                                                    C:\Windows\system32\rohsyqf.exe 512 "C:\Windows\SysWOW64\nuqzftd.exe"
                                                                                                                                    33⤵
                                                                                                                                      PID:2476
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\klwtx.bat" "
                                                                                                                                        34⤵
                                                                                                                                          PID:1648
                                                                                                                                        • C:\Windows\SysWOW64\rohsyqf.exe
                                                                                                                                          C:\Windows\SysWOW64\rohsyqf.exe
                                                                                                                                          34⤵
                                                                                                                                            PID:1572
                                                                                                                                            • C:\Windows\SysWOW64\cmxdodr.exe
                                                                                                                                              C:\Windows\system32\cmxdodr.exe 456 "C:\Windows\SysWOW64\rohsyqf.exe"
                                                                                                                                              35⤵
                                                                                                                                                PID:2952
                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\bqcph.bat" "
                                                                                                                                                  36⤵
                                                                                                                                                    PID:2364
                                                                                                                                                  • C:\Windows\SysWOW64\cmxdodr.exe
                                                                                                                                                    C:\Windows\SysWOW64\cmxdodr.exe
                                                                                                                                                    36⤵
                                                                                                                                                      PID:544
                                                                                                                                                      • C:\Windows\SysWOW64\frwnols.exe
                                                                                                                                                        C:\Windows\system32\frwnols.exe 452 "C:\Windows\SysWOW64\cmxdodr.exe"
                                                                                                                                                        37⤵
                                                                                                                                                          PID:2092
                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                            cmd /c ""C:\Users\Admin\AppData\Local\Temp\thyxk.bat" "
                                                                                                                                                            38⤵
                                                                                                                                                              PID:2352
                                                                                                                                                            • C:\Windows\SysWOW64\frwnols.exe
                                                                                                                                                              C:\Windows\SysWOW64\frwnols.exe
                                                                                                                                                              38⤵
                                                                                                                                                                PID:2788
                                                                                                                                                                • C:\Windows\SysWOW64\pfxyqsd.exe
                                                                                                                                                                  C:\Windows\system32\pfxyqsd.exe 452 "C:\Windows\SysWOW64\frwnols.exe"
                                                                                                                                                                  39⤵
                                                                                                                                                                    PID:3032
                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                      cmd /c ""C:\Users\Admin\AppData\Local\Temp\iehuv.bat" "
                                                                                                                                                                      40⤵
                                                                                                                                                                        PID:2752
                                                                                                                                                                      • C:\Windows\SysWOW64\pfxyqsd.exe
                                                                                                                                                                        C:\Windows\SysWOW64\pfxyqsd.exe
                                                                                                                                                                        40⤵
                                                                                                                                                                          PID:2504
                                                                                                                                                                          • C:\Windows\SysWOW64\ccoqjut.exe
                                                                                                                                                                            C:\Windows\system32\ccoqjut.exe 452 "C:\Windows\SysWOW64\pfxyqsd.exe"
                                                                                                                                                                            41⤵
                                                                                                                                                                              PID:2776
                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\lsybt.bat" "
                                                                                                                                                                                42⤵
                                                                                                                                                                                  PID:2552
                                                                                                                                                                                • C:\Windows\SysWOW64\ccoqjut.exe
                                                                                                                                                                                  C:\Windows\SysWOW64\ccoqjut.exe
                                                                                                                                                                                  42⤵
                                                                                                                                                                                    PID:2132
                                                                                                                                                                                    • C:\Windows\SysWOW64\knojsoh.exe
                                                                                                                                                                                      C:\Windows\system32\knojsoh.exe 468 "C:\Windows\SysWOW64\ccoqjut.exe"
                                                                                                                                                                                      43⤵
                                                                                                                                                                                        PID:2860
                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\pltas.bat" "
                                                                                                                                                                                          44⤵
                                                                                                                                                                                            PID:1844
                                                                                                                                                                                          • C:\Windows\SysWOW64\knojsoh.exe
                                                                                                                                                                                            C:\Windows\SysWOW64\knojsoh.exe
                                                                                                                                                                                            44⤵
                                                                                                                                                                                              PID:2320
                                                                                                                                                                                              • C:\Windows\SysWOW64\tcoovlr.exe
                                                                                                                                                                                                C:\Windows\system32\tcoovlr.exe 452 "C:\Windows\SysWOW64\knojsoh.exe"
                                                                                                                                                                                                45⤵
                                                                                                                                                                                                  PID:2596
                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\mkxob.bat" "
                                                                                                                                                                                                    46⤵
                                                                                                                                                                                                      PID:1588
                                                                                                                                                                                                    • C:\Windows\SysWOW64\tcoovlr.exe
                                                                                                                                                                                                      C:\Windows\SysWOW64\tcoovlr.exe
                                                                                                                                                                                                      46⤵
                                                                                                                                                                                                        PID:1548
                                                                                                                                                                                                        • C:\Windows\SysWOW64\ayhmhql.exe
                                                                                                                                                                                                          C:\Windows\system32\ayhmhql.exe 460 "C:\Windows\SysWOW64\tcoovlr.exe"
                                                                                                                                                                                                          47⤵
                                                                                                                                                                                                            PID:1164
                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                              cmd /c ""C:\Users\Admin\AppData\Local\Temp\wrafh.bat" "
                                                                                                                                                                                                              48⤵
                                                                                                                                                                                                                PID:1544
                                                                                                                                                                                                              • C:\Windows\SysWOW64\ayhmhql.exe
                                                                                                                                                                                                                C:\Windows\SysWOW64\ayhmhql.exe
                                                                                                                                                                                                                48⤵
                                                                                                                                                                                                                  PID:2644
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\dsoulqs.exe
                                                                                                                                                                                                                    C:\Windows\system32\dsoulqs.exe 468 "C:\Windows\SysWOW64\ayhmhql.exe"
                                                                                                                                                                                                                    49⤵
                                                                                                                                                                                                                      PID:1632
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\ratde.bat" "
                                                                                                                                                                                                                        50⤵
                                                                                                                                                                                                                          PID:2540
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\dsoulqs.exe
                                                                                                                                                                                                                          C:\Windows\SysWOW64\dsoulqs.exe
                                                                                                                                                                                                                          50⤵
                                                                                                                                                                                                                            PID:688
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\czmsetn.exe
                                                                                                                                                                                                                              C:\Windows\system32\czmsetn.exe 456 "C:\Windows\SysWOW64\dsoulqs.exe"
                                                                                                                                                                                                                              51⤵
                                                                                                                                                                                                                                PID:2188
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\lgmde.bat" "
                                                                                                                                                                                                                                  52⤵
                                                                                                                                                                                                                                    PID:2372
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\czmsetn.exe
                                                                                                                                                                                                                                    C:\Windows\SysWOW64\czmsetn.exe
                                                                                                                                                                                                                                    52⤵
                                                                                                                                                                                                                                      PID:2296
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\bhhsdzu.exe
                                                                                                                                                                                                                                        C:\Windows\system32\bhhsdzu.exe 464 "C:\Windows\SysWOW64\czmsetn.exe"
                                                                                                                                                                                                                                        53⤵
                                                                                                                                                                                                                                          PID:924
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                            cmd /c ""C:\Users\Admin\AppData\Local\Temp\ktxwp.bat" "
                                                                                                                                                                                                                                            54⤵
                                                                                                                                                                                                                                              PID:2428
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\bhhsdzu.exe
                                                                                                                                                                                                                                              C:\Windows\SysWOW64\bhhsdzu.exe
                                                                                                                                                                                                                                              54⤵
                                                                                                                                                                                                                                                PID:1020
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\ptchhuw.exe
                                                                                                                                                                                                                                                  C:\Windows\system32\ptchhuw.exe 452 "C:\Windows\SysWOW64\bhhsdzu.exe"
                                                                                                                                                                                                                                                  55⤵
                                                                                                                                                                                                                                                    PID:2732
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                      cmd /c ""C:\Users\Admin\AppData\Local\Temp\uiihp.bat" "
                                                                                                                                                                                                                                                      56⤵
                                                                                                                                                                                                                                                        PID:1596
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\ptchhuw.exe
                                                                                                                                                                                                                                                        C:\Windows\SysWOW64\ptchhuw.exe
                                                                                                                                                                                                                                                        56⤵
                                                                                                                                                                                                                                                          PID:1476
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\oskquks.exe
                                                                                                                                                                                                                                                            C:\Windows\system32\oskquks.exe 452 "C:\Windows\SysWOW64\ptchhuw.exe"
                                                                                                                                                                                                                                                            57⤵
                                                                                                                                                                                                                                                              PID:1552
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\kivsh.bat" "
                                                                                                                                                                                                                                                                58⤵
                                                                                                                                                                                                                                                                  PID:1800
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\oskquks.exe
                                                                                                                                                                                                                                                                  C:\Windows\SysWOW64\oskquks.exe
                                                                                                                                                                                                                                                                  58⤵
                                                                                                                                                                                                                                                                    PID:444
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\ysxfgvk.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\ysxfgvk.exe 452 "C:\Windows\SysWOW64\oskquks.exe"
                                                                                                                                                                                                                                                                      59⤵
                                                                                                                                                                                                                                                                        PID:752
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\kjlvg.bat" "
                                                                                                                                                                                                                                                                          60⤵
                                                                                                                                                                                                                                                                            PID:2980
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\ysxfgvk.exe
                                                                                                                                                                                                                                                                            C:\Windows\SysWOW64\ysxfgvk.exe
                                                                                                                                                                                                                                                                            60⤵
                                                                                                                                                                                                                                                                              PID:1968
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\yblvlce.exe
                                                                                                                                                                                                                                                                                C:\Windows\system32\yblvlce.exe 480 "C:\Windows\SysWOW64\ysxfgvk.exe"
                                                                                                                                                                                                                                                                                61⤵
                                                                                                                                                                                                                                                                                  PID:1756
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\rqytv.bat" "
                                                                                                                                                                                                                                                                                    62⤵
                                                                                                                                                                                                                                                                                      PID:2560
                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\yblvlce.exe
                                                                                                                                                                                                                                                                                      C:\Windows\SysWOW64\yblvlce.exe
                                                                                                                                                                                                                                                                                      62⤵
                                                                                                                                                                                                                                                                                        PID:2764
                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\jlxjvza.exe
                                                                                                                                                                                                                                                                                          C:\Windows\system32\jlxjvza.exe 480 "C:\Windows\SysWOW64\yblvlce.exe"
                                                                                                                                                                                                                                                                                          63⤵
                                                                                                                                                                                                                                                                                            PID:2812
                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                              cmd /c ""C:\Users\Admin\AppData\Local\Temp\tqjcq.bat" "
                                                                                                                                                                                                                                                                                              64⤵
                                                                                                                                                                                                                                                                                                PID:2432
                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\jlxjvza.exe
                                                                                                                                                                                                                                                                                                C:\Windows\SysWOW64\jlxjvza.exe
                                                                                                                                                                                                                                                                                                64⤵
                                                                                                                                                                                                                                                                                                  PID:2952
                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\iwgmjhu.exe
                                                                                                                                                                                                                                                                                                    C:\Windows\system32\iwgmjhu.exe 452 "C:\Windows\SysWOW64\jlxjvza.exe"
                                                                                                                                                                                                                                                                                                    65⤵
                                                                                                                                                                                                                                                                                                      PID:2684
                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\yxlyr.bat" "
                                                                                                                                                                                                                                                                                                        66⤵
                                                                                                                                                                                                                                                                                                          PID:184
                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\iwgmjhu.exe
                                                                                                                                                                                                                                                                                                          C:\Windows\SysWOW64\iwgmjhu.exe
                                                                                                                                                                                                                                                                                                          66⤵
                                                                                                                                                                                                                                                                                                            PID:2892
                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\lfabojj.exe
                                                                                                                                                                                                                                                                                                              C:\Windows\system32\lfabojj.exe 452 "C:\Windows\SysWOW64\iwgmjhu.exe"
                                                                                                                                                                                                                                                                                                              67⤵
                                                                                                                                                                                                                                                                                                                PID:2728
                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\fnfrt.bat" "
                                                                                                                                                                                                                                                                                                                  68⤵
                                                                                                                                                                                                                                                                                                                    PID:2972
                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\lfabojj.exe
                                                                                                                                                                                                                                                                                                                    C:\Windows\SysWOW64\lfabojj.exe
                                                                                                                                                                                                                                                                                                                    68⤵
                                                                                                                                                                                                                                                                                                                      PID:2128
                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\tyiuwlx.exe
                                                                                                                                                                                                                                                                                                                        C:\Windows\system32\tyiuwlx.exe 452 "C:\Windows\SysWOW64\lfabojj.exe"
                                                                                                                                                                                                                                                                                                                        69⤵
                                                                                                                                                                                                                                                                                                                          PID:2776
                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                            cmd /c ""C:\Users\Admin\AppData\Local\Temp\pvgba.bat" "
                                                                                                                                                                                                                                                                                                                            70⤵
                                                                                                                                                                                                                                                                                                                              PID:1564
                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\tyiuwlx.exe
                                                                                                                                                                                                                                                                                                                              C:\Windows\SysWOW64\tyiuwlx.exe
                                                                                                                                                                                                                                                                                                                              70⤵
                                                                                                                                                                                                                                                                                                                                PID:1552
                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\hybpzxc.exe
                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\hybpzxc.exe 452 "C:\Windows\SysWOW64\tyiuwlx.exe"
                                                                                                                                                                                                                                                                                                                                  71⤵
                                                                                                                                                                                                                                                                                                                                    PID:2108
                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                      cmd /c ""C:\Users\Admin\AppData\Local\Temp\cqvqc.bat" "
                                                                                                                                                                                                                                                                                                                                      72⤵
                                                                                                                                                                                                                                                                                                                                        PID:752
                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\hybpzxc.exe
                                                                                                                                                                                                                                                                                                                                        C:\Windows\SysWOW64\hybpzxc.exe
                                                                                                                                                                                                                                                                                                                                        72⤵
                                                                                                                                                                                                                                                                                                                                          PID:2256
                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\ggzfkax.exe
                                                                                                                                                                                                                                                                                                                                            C:\Windows\system32\ggzfkax.exe 452 "C:\Windows\SysWOW64\hybpzxc.exe"
                                                                                                                                                                                                                                                                                                                                            73⤵
                                                                                                                                                                                                                                                                                                                                              PID:2120
                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\aakwi.bat" "
                                                                                                                                                                                                                                                                                                                                                74⤵
                                                                                                                                                                                                                                                                                                                                                  PID:1872
                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\ggzfkax.exe
                                                                                                                                                                                                                                                                                                                                                  C:\Windows\SysWOW64\ggzfkax.exe
                                                                                                                                                                                                                                                                                                                                                  74⤵
                                                                                                                                                                                                                                                                                                                                                    PID:2472
                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\kwditwf.exe
                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\kwditwf.exe 480 "C:\Windows\SysWOW64\ggzfkax.exe"
                                                                                                                                                                                                                                                                                                                                                      75⤵
                                                                                                                                                                                                                                                                                                                                                        PID:2968
                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\yjepr.bat" "
                                                                                                                                                                                                                                                                                                                                                          76⤵
                                                                                                                                                                                                                                                                                                                                                            PID:3008
                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\kwditwf.exe
                                                                                                                                                                                                                                                                                                                                                            C:\Windows\SysWOW64\kwditwf.exe
                                                                                                                                                                                                                                                                                                                                                            76⤵
                                                                                                                                                                                                                                                                                                                                                              PID:2568
                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\jlqxkzy.exe
                                                                                                                                                                                                                                                                                                                                                                C:\Windows\system32\jlqxkzy.exe 480 "C:\Windows\SysWOW64\kwditwf.exe"
                                                                                                                                                                                                                                                                                                                                                                77⤵
                                                                                                                                                                                                                                                                                                                                                                  PID:1624
                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\jqgyx.bat" "
                                                                                                                                                                                                                                                                                                                                                                    78⤵
                                                                                                                                                                                                                                                                                                                                                                      PID:988
                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\jlqxkzy.exe
                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\SysWOW64\jlqxkzy.exe
                                                                                                                                                                                                                                                                                                                                                                      78⤵
                                                                                                                                                                                                                                                                                                                                                                        PID:1320
                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\sscdioc.exe
                                                                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\sscdioc.exe 480 "C:\Windows\SysWOW64\jlqxkzy.exe"
                                                                                                                                                                                                                                                                                                                                                                          79⤵
                                                                                                                                                                                                                                                                                                                                                                            PID:2664
                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                              cmd /c ""C:\Users\Admin\AppData\Local\Temp\twoqv.bat" "
                                                                                                                                                                                                                                                                                                                                                                              80⤵
                                                                                                                                                                                                                                                                                                                                                                                PID:3040
                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\sscdioc.exe
                                                                                                                                                                                                                                                                                                                                                                                C:\Windows\SysWOW64\sscdioc.exe
                                                                                                                                                                                                                                                                                                                                                                                80⤵
                                                                                                                                                                                                                                                                                                                                                                                  PID:2516
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\ghlvobv.exe
                                                                                                                                                                                                                                                                                                                                                                                    C:\Windows\system32\ghlvobv.exe 480 "C:\Windows\SysWOW64\sscdioc.exe"
                                                                                                                                                                                                                                                                                                                                                                                    81⤵
                                                                                                                                                                                                                                                                                                                                                                                      PID:2440
                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\qfsen.bat" "
                                                                                                                                                                                                                                                                                                                                                                                        82⤵
                                                                                                                                                                                                                                                                                                                                                                                          PID:328
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\ghlvobv.exe
                                                                                                                                                                                                                                                                                                                                                                                          C:\Windows\SysWOW64\ghlvobv.exe
                                                                                                                                                                                                                                                                                                                                                                                          82⤵
                                                                                                                                                                                                                                                                                                                                                                                            PID:1068
                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\xostgej.exe
                                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\xostgej.exe 480 "C:\Windows\SysWOW64\ghlvobv.exe"
                                                                                                                                                                                                                                                                                                                                                                                              83⤵
                                                                                                                                                                                                                                                                                                                                                                                                PID:1536
                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\kryen.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                  84⤵
                                                                                                                                                                                                                                                                                                                                                                                                    PID:1696
                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\xostgej.exe
                                                                                                                                                                                                                                                                                                                                                                                                    C:\Windows\SysWOW64\xostgej.exe
                                                                                                                                                                                                                                                                                                                                                                                                    84⤵
                                                                                                                                                                                                                                                                                                                                                                                                      PID:2816
                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\btmttby.exe
                                                                                                                                                                                                                                                                                                                                                                                                        C:\Windows\system32\btmttby.exe 452 "C:\Windows\SysWOW64\xostgej.exe"
                                                                                                                                                                                                                                                                                                                                                                                                        85⤵
                                                                                                                                                                                                                                                                                                                                                                                                          PID:1584
                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                            cmd /c ""C:\Users\Admin\AppData\Local\Temp\hkpav.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                            86⤵
                                                                                                                                                                                                                                                                                                                                                                                                              PID:1424
                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\btmttby.exe
                                                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\SysWOW64\btmttby.exe
                                                                                                                                                                                                                                                                                                                                                                                                              86⤵
                                                                                                                                                                                                                                                                                                                                                                                                                PID:2308
                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\ugoecjj.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\ugoecjj.exe 452 "C:\Windows\SysWOW64\btmttby.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                  87⤵
                                                                                                                                                                                                                                                                                                                                                                                                                    PID:2252
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      cmd /c ""C:\Users\Admin\AppData\Local\Temp\vhumq.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                                      88⤵
                                                                                                                                                                                                                                                                                                                                                                                                                        PID:2668
                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\ugoecjj.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Windows\SysWOW64\ugoecjj.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        88⤵
                                                                                                                                                                                                                                                                                                                                                                                                                          PID:828
                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\georkme.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Windows\system32\georkme.exe 460 "C:\Windows\SysWOW64\ugoecjj.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                            89⤵
                                                                                                                                                                                                                                                                                                                                                                                                                              PID:1656
                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\rbkuk.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                                                90⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:324
                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\georkme.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\SysWOW64\georkme.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  90⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:2784
                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\ccvzqjo.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\ccvzqjo.exe 452 "C:\Windows\SysWOW64\georkme.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                      91⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:2336
                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\dvhrf.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                                                          92⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:1536
                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\ccvzqjo.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Windows\SysWOW64\ccvzqjo.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            92⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:572
                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\roseuja.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Windows\system32\roseuja.exe 464 "C:\Windows\SysWOW64\ccvzqjo.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                93⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:2580
                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\bfpxt.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                                                                    94⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:1088
                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\roseuja.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\SysWOW64\roseuja.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                      94⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:1584
                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\uajeaez.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\uajeaez.exe 452 "C:\Windows\SysWOW64\roseuja.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                          95⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:2872
                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                              cmd /c ""C:\Users\Admin\AppData\Local\Temp\etgek.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                                                                              96⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:2268
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\uajeaez.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Windows\SysWOW64\uajeaez.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                96⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:2796
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\zcaskwh.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Windows\system32\zcaskwh.exe 476 "C:\Windows\SysWOW64\uajeaez.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                    97⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:2444
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\rogdg.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        98⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:1900
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\zcaskwh.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Windows\SysWOW64\zcaskwh.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          98⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:1072
                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\awycyny.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\awycyny.exe 480 "C:\Windows\SysWOW64\zcaskwh.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              99⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:2336
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\ivuoq.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  100⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:624
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\awycyny.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Windows\SysWOW64\awycyny.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    100⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:2584
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\fvedgih.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Windows\system32\fvedgih.exe 456 "C:\Windows\SysWOW64\awycyny.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        101⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:1392
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            cmd /c ""C:\Users\Admin\AppData\Local\Temp\ekuvb.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            102⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:3032
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\fvedgih.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\SysWOW64\fvedgih.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              102⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:2652
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\aomlkix.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\aomlkix.exe 524 "C:\Windows\SysWOW64\fvedgih.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  103⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:2316
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      cmd /c ""C:\Users\Admin\AppData\Local\Temp\wjbtg.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      104⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:1684
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\aomlkix.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Windows\SysWOW64\aomlkix.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        104⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:2092
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\mxpgvdm.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Windows\system32\mxpgvdm.exe 452 "C:\Windows\SysWOW64\aomlkix.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            105⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:1756
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\sxabx.bat" "
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                106⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:1668
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\mxpgvdm.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\SysWOW64\mxpgvdm.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  106⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:2580
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\flbiire.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\flbiire.exe 456 "C:\Windows\SysWOW64\mxpgvdm.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      107⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:1976
                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 512
                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                      • Program crash
                                                                                                                                                                                                                                                                                                      PID:2776

                                                                                                                                                                                                                                                                                                  Network

                                                                                                                                                                                                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                  Replay Monitor

                                                                                                                                                                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                  Downloads

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\aakwi.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    1611099aa635f3ce16c5737c08c336c9

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    10812a632ad4c3ecbeb12e7cacf42c7d3dda2553

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    ace3f52f20474c6c9b1e110eef0e8fbbfc04369025d2347c703d8bd11f5948b0

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    7d1c53cd41dd61801d520f591672380f7d94fd8344e8dab90420e225753222d0f4c9a0ea30ad206c8a8e828a719f5ef57182050137a3217a1240678eabc45d35

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\aucrj.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    d3a38fc39561e3aa49850419c8baca0d

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    2ad7be6b337eb53d8e1c5c4ae6558d79565ed1e4

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    0fc4b57fe5f68fd7640312aa6855118929c1a2bc5df12fdeffec61f7b837eadf

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    4d8d5d7009bc6cc522ddefbf3da5ed39a391ae50d4abecbdcb042593ec9f877fbd934ca7ce5b157436888ce8de232e17fd027d37e014dc89150a1423544ffc10

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\avqdg.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    134ddaf8d930da2e2dfd72a6c342355e

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    a0b6ce100d3a2531e0c8a757c9ffc5fa6a45fcbe

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    dd935c06b29e40a1a72fd01154e891b59517782bff7532a883d9c7aedbb45408

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    6cddf832f33ef6f11857b328f927321150ed50871f6a7050a4303ba377416eabe1229754693f68016b3632272014de038f9fa3b0afbd5edc796d3cfcc870b2c7

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\bfpxt.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    d1d6cc0a9646f90f8d545615c3a26ed1

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    b0cd90fcd3031660da06b9e12c147c230d3943ae

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    34f17aec549087b1283412a183c3dac0f52596acc4aaf17db044feab5fc5cce1

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    b988a489bdb89b00dec6418b2bca200a17605340e062c2545b35387f0c10f24bdff32ab642855ea45be5cf3c0409283b9a0b8ebd3434246b14f598201e77e171

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\bgsls.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    9ce2e3c80fabc3ba05197caece3e8889

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    0039248160c6529c2bf798c324b8d5fb39696345

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    5c4745059f1bbd46c5d71da14d9c53187e4394f0469c41717a924ac347bbb30c

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    f344bf59eb41ec50abfc287e7c12fc41fbf311f85db116a69a01295e5d3ec4f6bbe2883e9989a947d6d8cc0fa75da94425432799e98cf84569479de20161aac9

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\bqcph.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    da7b56e7a0553deccb323c42bab56520

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    26937ca17e608e3f1250d3605c9116fef98ee10c

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    85ba9c7b4ba7ddc3718fe415f67bf0e2e210bc4250d74dbd9acce2b53daade7c

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    72ccab8af0d001fa5d945a5218287305475c8fe4947410e4e3ffa7a4740e0dd96d46e1efd7db83c4bb6adc20115deb889b1e915568f0a73a4b1e072799a5c343

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\cqvqc.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    405a16177e283d3a0a6b3f35a574928c

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    0a3c940086c8eb0362c3d4e688340c600600289c

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    77ec1b2bbed40ffee3406397fe97cdbf79436fc00c5e2ef32d3640d2923e3660

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    6830f6429afcf35e6765a8c60d99fbd5b3f49d68527040d7fbaa355c88d8f308efb2cdcf9c637a0eb4af397dddce6e096a3d1df64fed992986e3dc7db7ef7bf1

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\dvhrf.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    dd29a9d684ca93704568121f5a9bc379

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    a227903a60e254bb206b611656ac0cc6f1f90fa5

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    3529f7f0cba95791f89e2f20a5cc15ade0b4805786f96f3732e4a4362663a913

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    0662b01601abedffa012804eceb3ae53a0a8a4f6b07d6d0857850a5b3d94f77859bd95390525882222a1215e7098de572db1317b32ca0048bedca2e0647630e4

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ekuvb.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    b273a357f19294aa7f550a6839099567

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    21746392b59648cc7baab93c5bbd64c1604b0cd7

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    a5700a600fb82351e936eecc11efb23ae9421d932f71c77d92b7b69f530aa8ea

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    c669038e4e920ec1156f277426f0a47f1d2974f20b2c5a92de7cad2095642e484c9c697dc05d7798c4e0179896a8d1a2e4815243be12776e82eecbe8dcce31ac

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\emfkr.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    7764e4bd244c72d0102d75408296bb40

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    5c249266623874128e276f0aefdb99aacade5837

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    d354a066e27adfedf767fa0c01681fc59c2ab5934bf333269b5192183267f479

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    a8efb62f188724830fd8eb8080960abee5014fbad2c7d282e916681cab701ac61e75e0ef3298a6275ecd580fa7a432b9f4549b22a7fff39e85bed54f0f3a8345

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\etgek.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    7ec56690509b83c23f5db1943e3d36ce

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    21f8d40d5bb5fcd337e4bbaf441664c082d74ae8

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    e3d66c91f18fff2c320845e95a515c3f6f49317a0a01f75bfb9e826e56ae0ea9

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    6419b14d1944219bd260c7e1d4444ce1369f05405a2549d679ced1d768638aeae4b78926f6c99b49e8082ba99ad5690aa7c9dccb3450c4239adb0c2284df9fe7

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\fcxoa.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    257B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    30c9e3e1e6fbb0354728b617bd83dd40

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    7e85bfce4fff3ed75d1c3192b0b5a787b7392945

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    6cf4f16ea279e9a3f3157247ccfc04648a753e94269ca1c9f41d1c637ac2cc64

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    4f460b3b10ade97f877ee92cfe437b4c8f4c483aa50850e6a187e1b25b8a5f17744d479f7672d3bc02fe1a053975c82936ac221c6e6a87734db737bf71aa83dd

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\fnfrt.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    274ef5c7f0d74b4dc1c39556df350acf

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    a4a6e692175e5b8170b3ed5067790fae55b56200

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    38a1e743782737dba11845a35721cb3ec1b25dc9581dbefdc05b09f2dfe613ba

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    74142981252a8868c1430be8a03ac99013f0cd285a8a1117cff8c2d5f6878b43853838d1f75156e8fc453327d69eecf8ff0402949623dea16193137abc69ba43

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\geajq.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    f7f532738187320462c17fe923a31f01

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    9bb673b25406d35ff8f24e5eb00b1289e252131e

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    7690a9088513c29b1cae12ecf90f99f1a0b7c3f5643b034cf00f4e0d97c5e305

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    ecc662f12e4ca8ac61b42fc3b7d444852752ec1e7a46a02e2aee1a381e7417edb16a3823ec98ff8098621ddf5b5a90d06132a20857e70f6ee416c3357ee3a689

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\hkpav.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    497fafb3f99f35b4fe070e022614bbf5

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    82872cc12c1aaaf193b24d44b8e3f396f6380254

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    0d08cfa01a49baee5ee7ae3e41d3efcac8317262ebd14fc43897602f1f4999f3

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    62c8cd57e6d6944621c7c31df7fdd0a2fd8e8bfc81d9908df3a5203de0419d92d369700f09f5a04eb6845250f15bce77e89868b6d8090a9e70d39aa446dd21c0

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\iehuv.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    2c1545b734da61c13199461c983aeb40

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    6f4af4754ac67b6d5bf82ea75761eac9ccf712a6

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    9988eeb8a9a9962064659cec2b5f4fc1fa1f93582f283046513baded3baab73e

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    543ee0fad4b6357e13ba53c10e612d7c13118a600087b8619890bf7aa191eec4533a23e0d1b0e71a0e0ddbb4a7bfd09a86d836423ceefeae670b9b858f235e61

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ivuoq.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    f10724354f3d68d4c73adf990d6a1f17

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    8759c743f646008c0a079c58e2e72f4efa308f5b

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    50fe4f1e220eeda52511f780659772fc9602e5f8544d86cdca2e5548e7cda255

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    08b28a59ebea89cb82c06c109ac9f67a428aa09accbbdc80211042083d499c43aab03f73b0a26b9019235b0f767019702d52c65c8e2029545c75265311ec8364

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\jqgyx.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    7b8dc4178091b898e2011054173a58b1

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    df3fdd90f387afc44055a8e14a210591a7107039

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    c97cad9b960a4c569f69ec12b5db34d9469e080bba850aa04006ea3793322b38

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    2ba2fdf4798758d3136d5527e9acc04d96c92febb229b6298e13c293e7a792b89c250e8d69214bb7cb3288baf57bb01a471945224059347962d0d2f71a0ecb64

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\kivsh.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    7192de78cd87d500c93fcd6637b85541

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    5e72cbb4fd978b1ed8a6ad63ed973d34913b0b34

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    8087d1be2a1b3a9f7cdd25872618bd266f2292ca711f59dadce3fb70b81ee03f

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    56dad0d6f8631b988f8ea4c38c53f235c012be07d4dc4f1b4e38f356020cf3ffacfae01780c3fe6be061b8dad09802ef09d4c15b03856dc7ea6d280ef826850c

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\kjlvg.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    5c963d411bd5959f21d604e5f626895b

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    10015fab85b37967f236217f158d935594c1052f

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    8838d27c3342b11f5a6a9b6d05618f456701be74b3ee6739611f3edc28cf56fb

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    273526eb9c1eef1aed6b8df6eaac00506213c8f145107b98efd2a7d98e0cd84bbebc060430fd93a6d31d5424b401f1cb927c05f7cb5b286a8e9df388c9cff23c

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\klwtx.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    ae11e153df80a635a55accec10751bf8

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    383d0a9ea7a997aac2c93adeccba7498e6287e9c

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    e153f71ace6039b8bb751062506c5c0e0e56c95faf117faa39a5464a9d34b1e5

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    4de52240a57b060b76c4c2c88a096123f614082b17a1191ca5e0549c5168b153d1027c3349433a84c25efe20a9f0c1b012c57513f89be4f79e373bd0e6957995

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\kryen.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    2d05514f7c0141619bca65d32d97680b

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    25aebd626ad815dd227f85cec5b8997a3e83e6e4

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    e2c21496dd7d0f59035e1550e17e1bee25f7e6991d7ee73a85ef02dafe488f6e

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    913a5980d000245bf042cf1960471a10c388af5cccf072cbc89bea91505c89bba6f979f2d8dabe658ee368f9830446e42b990af10891a203290cb216dbb09966

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ktxwp.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    b7d74550db93c9a4cc311fb4bee547a9

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    00b541417170b9f5af3ad773c6888cc48f0acfc9

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    429232d01166d965c5f634f4a61f7b3cb0b5763a21bbb2fddd577b8bfeae7fb7

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    9496579c547a89b7646629fc6009d00c61e6248395c606e43d8e28f0e99c7ed3a2af3338f0c37cafb2c93fbe3d8230f6a19335416e5ae69a0b0b9a90b6098e50

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\lacgf.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    288adf89318ee82bb2ecc3ad58398a6f

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    b4c1141f18307997e5fb092a53a33c876fa952f5

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    b62399ef23697948860038a728d08934e0600d26438defffff0f9d11a9edf022

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    356d1bb344558b5797883da12f97657057549b4ab03ecdbfbdf8231b722200fec36345c026c70bbaca147db0ab1f9feae2c5319949f601c4b236349ea0eb3cd1

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\lgmde.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    fade8b36dfa71be909bb4d5979bc9e49

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    8ee587b85018ad34a722a698105f5e0e6abba7f2

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    0b1152d35ebb1cdbf611a8c19097921518e49d481b8a30a737d0ae4404a47750

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    214afea7b2cfb6580cc4316736473f49442f72b16531560f2d7c4ea98ab1829f851a74a1b440e846629f988bade2de06369848ca88b2c27bd414a09a2d49fb8a

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\lsybt.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    d3f816ecc745eb071b9b23381f94d67d

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    ecbea6df78fab312d4523433587e92883ec7d286

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    1272cd79849991b80c11bcadfa9ceb8cc9d02fd0d28f4b256ab1b1324d9355ae

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    5fa4a7eb687c29c4ace0e467f178711db4db8cf51d42cd372570ca841c4525d3da6127e5b0b7545120f64443f1ec35d6f129e0b9387d40f816d351ff2ebeb5db

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\mirok.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    1aaf34a909ff99f26f567cfe72782171

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    f143c472515d8a361c6525566bf7f699785061ec

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    01727a39023a9e4d610572d82614057cbf13d51a0fa34b5fbd57938554b167b5

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    5f2a8cabb536db4b5e49ff5057ec6ae4577d076f0c33645f3220a786067c53de69cb4dc6ec3c2f4bb77232e867b2f20994437423cd6f4d648365609a8c3f44fd

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\mkxob.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    37da04341cc824ba107a98c2dfd3e4c8

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    bc64fde2c5fcdf17f41409dd2ca34b691bf753cb

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    aeafd30b7739e351e901a81cabcf48a3b620bb1ce963953e9188cb1f547103cd

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    356f1168d07a400c5d105edc5d6002994ad19990f9dbc31af38c7bcb89c056995c6ff23097a96d865943f4eb30bec812a7dd60534b36476dcf8021c016610f0c

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\mvfbf.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    8b2155eda7d0190a79bb9e59687b02e1

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    a689af61d65050cdcc50d21b38194e0c7af17c98

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    19c5250dea0c277829215ec5547300449db56c7f06cda4cba8db0c62cc4252b5

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    457d8a52e5175fad7522d88be4bbbf947325c5ad76c0b2410bbeecc71eebd087c61a6bcd614da0c4aa797bd5f62ac384677e623687d7f64a321013ad004d1aea

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\nenwv.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    fc21d1a668615428049641ff3a2d9d76

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    d3ef2e086024e9a681b7c4ca5650cf7ff34c77c8

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    784f3cf0235a1cce3ad29bf1d9d6dbece4e1770e988a26fad928e1a793b51da3

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    923bf866f09eb21ed0f6192228552f4c256733c2e8544e08157b0fb96b5f55fc2fbf915a5ad46ab1d00de69b03d3ec56b400fedf3cb2555d270c6dee53f582bc

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\pexfq.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    1a6bacbe6336d09f374a54a55978d676

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    aa024659d762c94e23d0a881dbade4e2efcccda0

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    673ab765c942eb39a7b186d68f4264f3a49ccd301c13bf431556ff114b25afa3

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    a62ac2f4883b95eadbec804e9b1154cafe357103b8ce4738eae8f50a840eb89a5756ae6a3cd1868ac11de57396d2a1a672bb8de8db2f8f03b569312fc212a1c6

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\pltas.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    094e1f4cba1a1ad52f84e0abf483da61

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    4c2573bd3ae5fd03c2637d8df7c452fd7b037cab

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    538fd11d6c111c685322a66407a010edcc766f53f75812debb796f1c6e5860e8

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    94ebd2499172444337119042db5eb2aae349b5952478251b84c670dee581e8270f6dd685bddc5feeb2f7fe837876fd7311eed6622eef828af33d301c79134288

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\pvgba.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    1e0be14848605d552ad325733568531c

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    e1e78535ba9289a3bd5ff389ec15f2d595d82ac3

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    b8cd93afd53d61cc21e411019483cf7a2cba49b864093ed3b927e2987999f922

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    f73576d47674b7fec7eece56a696640c450364cbfd743a561747ec22190106300a8f0b921ebd481c0ff5fc9e3fc7d7a9f504aa320a33fee70c7b46ee5136d968

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\qfsen.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    3962ece909402c7d87457125acb5ee03

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    fbca8a3120a543d5b5c1ac1a505a3e01422816b6

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    8ee756409e4b7518165472ec5bb66823d97f76a71f9a647749955eca95c6c2f9

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    a203bdce4b8388c340a8231d08d21e5439e5ad13445e5c140f6e6282adbef04b5f5c5e40feb62e5ab98dd96831005ca90019fc6ce7b59e115d692f8585f5671d

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ratde.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    2faf930beb5ddfd0e91c9763c50deedb

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    02785e778f51b1305b45b54c6b036f1d14aaa97a

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    48caeb384f647a6fbddfde29134e70be4ed38bf2201299b6669f56d9ec6e865c

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    58882560732558fc268043a260364b1204efafba08a21eb429e36eee8859e7a11bfbf9b94434f392312d2b4cd66d58695e534b125378c8d63b47bf43e3c9f068

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\rbkuk.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    a4ffe9e9b422635a5509070984e69a4d

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    847adc4208556c847728eb87f8caad8f8a2e630f

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    4021d639d46ad68101ede832afd3623fa1eff8be5926e24378b031a53740c85d

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    7aeeaabef9c482ad9857161d6f39eb2f209dac856a8d38618ad80c2bc7b28bed3573050ba5065aa1d0d024e199f8d21faa5c7fdac21e6f91d22d70415aa503d9

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\rogdg.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    19b2cf005e77d46d81fb5e26d93a7c4a

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    bd2fbba7034da9903e912eb95d13cdee389012e0

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    d0ea33166bc997187b5bb452945bf0ba96c35de4070d7752018a5117c4a5855d

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    474d91de1fe3b47a8011c770a291dbc57bded03a5f83e6e0e9ea6ebc5c003774d7b94e9252bd9ba232b01e6a33ce6d1a92d220e79e9152a8f02e9f732ac6911a

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\rqytv.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    ed2f52808e71700309cb8d312ab0aa27

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    a3df0c90f6bb3a7165ce0b7b14182d28e0d3c2c2

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    967e5414d9aef8b089e80c47e66f42531f766d24552c3d3eab77740facf9d9c0

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    1224473c731e10cc95886af7debff6d7f38d63444aa1a6c620ecb8003183887dc3380dbce28a71256083b95f0325cc56ddfc6ded365b4ccaf7c6de133e95d0bf

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\sxabx.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    b1565c5988d82eaa420db03d9285b190

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    0688a5ce414af6b4cfbe8563990ad30ca8e1348e

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    2d3f183e07fd6e4532aba59f14058101cf85a220fa00e807020ca6640417d203

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    44e3c25fde4f7edfcdc6497152e2de6705b464f23d860709a61a90d7b08b3c340e2882da45739c61d1da7269202931518cf578f47b415c126100d89506ce6ed9

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\thyxk.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    62d5cb90fc327f1d6605b2233913e300

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    5dd307f07f2482b523fcd317ae8afb4d54cadae0

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    b835dd4265c6d8ecea4f6061c9a55400496a40e9657a5fa130792ec01568cf21

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    66bca7a490db77d95b1d80ba8a62cd0e2b77fc9827a08b96eaed5883dfd3e14c68621380b5288a057fbd91ba165d6a3c3eb9d7898cb35a9929b36f466b0b87b4

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tqjcq.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    57607535ddb199e0ab42dc593a8560f9

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    3669afba88e1944f3f3b5392a18f24de7381fcd3

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    cfdb172d98624211d4aaea8f223ee7701485fab7742109e716e62932cb4f3c8e

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    ace51081646eef18d6328d03b638929953a4fbdb2b59af2c966a734f45f2b4d0ee6bfff309eac27f6ca000a57aedcb32793979bac415c5ba92e796bd49a3ca2b

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\twoqv.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    f414174445a314a3393fd6de8f445d39

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    f5925c81bb36f4da888e6f10f45772fd94c1e34a

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    bd1eb16213b4fd3a055f88ffa3a1d51626f850baebc8f961afcde3935bc15954

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    438c79dd890c6e026fdbb9a5a4229c53f69e135e7588fb15bd14a157cc7d92f057fe75a2712877e6cb9f3814662df4e4d0432841c094ebcded847bc5d423f229

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\uiihp.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    70cba333e615a67b6a52a056b8d64ec3

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    15f87a19d5a3afe8f285dc373315ced57a19f20d

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    bd757e13a77f8b61dcaba65ac29827eff70f2c18d87f728d33d0f7493d754e1b

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    6068b5b1cbe0385cb93879e25a175184b6d615e9fc56db296dee389465a849d24e2740dd922068aeca7ba42b92057b2b5a3cbbfacb5bb7ab884021782806b994

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\vhumq.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    aab43e54537b7e6a339c62ddb15c6fcd

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    a53022090951c9faf0cc91ca99b4b64cde098268

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    e5ddc9aa5822958a248b83c4f5d3f424f5819c486460ec6198bd3615d1bedc83

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    e4b44321974ec8c3ab054f202b002aa873b9db6f133a060bd26c52142d105f66e39fd9dcce3ee93e240169261777f4ed8bf1577a50b1e151b212647561011cd4

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\vxeim.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    16dee7234ed3128f8d8953f33c9967a3

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    df6cb4f31f7f6b54ff107abbdc564adee77a3419

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    71f1d14991bebb7cc2844cc63187c47aec5b23e6769be50bb2237224c9c63a33

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    b72d7b318d9b37d6bef8dd5fb662fb43222e333e506ef8f5d409c0cce8e97731958c7643162fb09630c44ff216e7b93feca901f929b8829f37212bb36e89a7cf

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\wjbtg.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    3de6ba2d8fe4ffefa9af7156913a45e3

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    3832717830ea23e2708ea481a53bccd731c91a30

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    3f6d5deb28bb2da15a33d3d1c7bf0592a41857c02d4f9e421aa9cd65408aff06

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    6e67739020645686d68e5bc99b3abbb4a33b0444987a597102f932baf5d14f825c7f97459da3a8a7a247726ce64c0c2266d240ddbf4d99f88788f24ed920cf5e

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\wrafh.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    1710456e4a0ec4988abccb11542632c2

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    ba5bce41ce5ee3f580961c918d8341fbff7c44b1

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    501ea07ae532139c5c779dc640e29069450cc3eeaf7f11582ee04fe1e8a23c52

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    70ee31e5fef00ee9bdf3c0d4640980fbd17dd65cd3c544a4c8be966e3f5110165a6c6f2d8927ff157c81a2b549957c9937ec171bcced6b9d2a4435bd566de2f3

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\xvbif.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    d5a180afb7424d0cc21934d2f90b62a9

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    9bd768d2abc8ea19d104cf642c49d2d721c3322f

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    e5043ee42401b2af721a67369becae26c75e77dced609c99c4f9a11ba071000e

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    0aba2d79598ecbc034d35ce6a92e02d50f466b59ba4b721d01530a93550c114e306d9fa2c9a0b981015739c2dd0f9a7bd190fae946b858cebf7397323408d704

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\xxipc.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    a9b6f05ecf1dd42f08023cb066ff6527

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    0131632890e36e528f42e55cdb9da6af88bd2d35

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    86d1d3a60bbb6767b5b1394dd7dbca31746d6b36477321b24a49637ca2d53bd2

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    e79c233d2c17acafa82a3122de56c152d0a46329cacc2f4480f650cc06bd403d766320238db2fbb0a6cabf73a09c5b8a294fd70ebe8aca3083f640a72c28e642

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ycsay.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    57917c1fa516488b260bcaa8fae3480a

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    b5b5a0f0cbea91affa1e40d837f52a4dd106cf81

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    efb6f5db581a77822233b9272376883cd7054bc70f1dec120b5b17ed2a9b4edd

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    0ad3a3e4cbf89c6ed757e4e9b29e85c9d21f6e5ac6e509a79582903832d07fe123d0e376d2bb210f07cdeaddcaa01ddaa62249b92cb554dda6366f1ab95e1220

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\yjepr.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    0e155b637cdaa3c9a04c908490d9a02e

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    c3ee2c71ee7ce55dc9914e91adec65c8952e3c4b

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    f326b58448d038e4b3426944b29e7c7d904c5329a92fc8103bf17460fa2bae80

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    6bd7325fb84a8b497d416eb8416c0986f8bfa318021fb96a5ca849661aca17e0131e96956c3802dd8cdc7d4590a1e8f2494016046eb695c8942cd700905f3892

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\yphcv.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    76e5e26209bea81e35c2982bf959b254

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    5dfdb7c840c833ab7f744027d7090873661b1449

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    0f097cb7684ec2426590a9e2ceaa327f2943e62bf18bbc6dac803e7a8bf7856c

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    b6e31eea9d322944dd126715e410e7cf5d5340769efad2fc16054676ef49aa6e4e3422b91a59cbfaf3d7f116b7b0988513d41ae6b8bdb6b9794168056e565d17

                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\yxlyr.bat

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    35fc2f53643b17ccb6359a051a01e1b0

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    253dd48cf1c196bdfbc3d81751ac8a17b0ad9d0f

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    29e375d080e2352c1e6872bf216535d9d2b585580acfccfd825494eb2e5fbe3d

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    90c492df6af1d81711f8f77c10b8418b7baf434dbc101813c576724e39e9886d1b245e5f6199cc42f23eb52722c2b8fc9d47fea0ab7beb43a19184a6aee3f53c

                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\pazthev.exe

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    1.4MB

                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                    98513d260023a0cb3667f2e8dac81c4f

                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                    189be40083f151d30b3c588accdc23ea6c2f5075

                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                    2925a43bce9b41922ab001e421806ef21ae443d4f1eda68639a9b155d5dfb29e

                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                    6eb37009bd8f8145ad9378c87605a6f0195ceed56213bc7d17bef6a78ef6889900442b8f38fb9bd44f780beaa7d7e328b51a2885c141414810a91f0d930a3f27

                                                                                                                                                                                                                                                                                                  • memory/632-122-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                                                                                                                  • memory/648-85-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                                                                                                                  • memory/908-146-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                                                                                                                  • memory/1112-309-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                                                                                                                  • memory/1308-318-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                                                                                                                  • memory/1524-354-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                                                                                                                  • memory/1628-216-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                                                                                                                  • memory/2104-170-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                                                                                                                  • memory/2216-97-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                                                                                                                  • memory/2288-241-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                                                                                                                  • memory/2380-195-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                                                                                                                  • memory/2388-344-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                                                                                                                  • memory/2452-9-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                                                                                                                  • memory/2452-11-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                                                                                                                  • memory/2452-34-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                                                                                                                  • memory/2452-12-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                                                                                                                  • memory/2548-265-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                                                                                                                  • memory/2976-282-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                                                                                                                  • memory/3036-49-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                    1.1MB