Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-01-2025 15:23

General

  • Target

    Xworm V5.6.exe

  • Size

    7.7MB

  • MD5

    027ad6a104d074597068c1781cc0c90d

  • SHA1

    b489c6f4d29db588ecfc65df7ea92d6c23de4a20

  • SHA256

    238bd89de11cbe6b00e7bf57f13863394bed494b73d09570011f27b87270b51a

  • SHA512

    0e3beecff23c8d426d859758b5c9aa4490e5d47ea69e4301c73fe499bd6535ec8dfe22dae552c8e14203d78768cd2ccfb70f78e876de2ba4b2532cf502b40e4f

  • SSDEEP

    196608:xKLCFU/jHq/puROyhxeyOC7+oiRkbtejBe5:xmq/pkOYxehohbt

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:18194

soon-logical.gl.at.ply.gg:18194

Mutex

APoxCrOmNOvTLB4L

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    chrome.exe

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
    "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
      "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2508
      • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
        "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2168
        • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
          "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2696
          • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
            "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:484
            • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
              "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:852
              • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2120
                • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                  "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2988
                  • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                    "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                    9⤵
                    • Suspicious use of WriteProcessMemory
                    PID:296
                    • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                      "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                      10⤵
                        PID:1492
                        • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                          "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                          11⤵
                            PID:1600
                            • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                              "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                              12⤵
                                PID:1920
                                • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                  "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                  13⤵
                                    PID:2244
                                    • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                      "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                      14⤵
                                        PID:2736
                                        • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                          "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                          15⤵
                                            PID:3052
                                            • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                              "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                              16⤵
                                                PID:656
                                                • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                  17⤵
                                                    PID:2808
                                                    • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                      18⤵
                                                        PID:1548
                                                        • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                          19⤵
                                                            PID:1400
                                                            • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                              20⤵
                                                                PID:952
                                                                • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                  21⤵
                                                                    PID:1336
                                                                    • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                      22⤵
                                                                        PID:1808
                                                                        • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                          23⤵
                                                                            PID:1340
                                                                            • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                              24⤵
                                                                                PID:888
                                                                                • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                  25⤵
                                                                                    PID:2756
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                      26⤵
                                                                                        PID:2644
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                          27⤵
                                                                                            PID:2728
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                              28⤵
                                                                                                PID:2736
                                                                                                • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                  29⤵
                                                                                                    PID:2700
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                      30⤵
                                                                                                        PID:1584
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                          31⤵
                                                                                                            PID:1968
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                              32⤵
                                                                                                                PID:2692
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                  33⤵
                                                                                                                    PID:2356
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                      34⤵
                                                                                                                        PID:1764
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                          35⤵
                                                                                                                            PID:1944
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                              36⤵
                                                                                                                                PID:1932
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                  37⤵
                                                                                                                                    PID:1708
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                      38⤵
                                                                                                                                        PID:2688
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                          39⤵
                                                                                                                                            PID:2844
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                              40⤵
                                                                                                                                                PID:2672
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                  41⤵
                                                                                                                                                    PID:680
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                      42⤵
                                                                                                                                                        PID:2668
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                          43⤵
                                                                                                                                                            PID:3036
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                              44⤵
                                                                                                                                                                PID:1584
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                                  45⤵
                                                                                                                                                                    PID:1968
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                                      46⤵
                                                                                                                                                                        PID:1848
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                                          47⤵
                                                                                                                                                                            PID:2120
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                                              48⤵
                                                                                                                                                                                PID:1328
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                                                  49⤵
                                                                                                                                                                                    PID:2180
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                                                      50⤵
                                                                                                                                                                                        PID:2204
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                                                          51⤵
                                                                                                                                                                                            PID:2612
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                                                              52⤵
                                                                                                                                                                                                PID:2732
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                                                                  53⤵
                                                                                                                                                                                                    PID:2768
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                                                                      54⤵
                                                                                                                                                                                                        PID:2336
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                                                                          55⤵
                                                                                                                                                                                                            PID:2624
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                                                                              56⤵
                                                                                                                                                                                                                PID:2788
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                                                                                  57⤵
                                                                                                                                                                                                                    PID:2744
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                                                                                      58⤵
                                                                                                                                                                                                                        PID:3012
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                                                                                          59⤵
                                                                                                                                                                                                                            PID:2136
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                                                                                              60⤵
                                                                                                                                                                                                                                PID:2152
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                                                                                                  61⤵
                                                                                                                                                                                                                                    PID:708
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                                                                                                      62⤵
                                                                                                                                                                                                                                        PID:2168
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                                                                                                          63⤵
                                                                                                                                                                                                                                            PID:2532
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                                                                                                              64⤵
                                                                                                                                                                                                                                                PID:1840
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                                                                                                                  65⤵
                                                                                                                                                                                                                                                    PID:2316
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                                                                                                                      66⤵
                                                                                                                                                                                                                                                        PID:3008
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe
                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\Xworm V5.6.exe"
                                                                                                                                                                                                                                                          67⤵
                                                                                                                                                                                                                                                            PID:2644
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                                                                            67⤵
                                                                                                                                                                                                                                                              PID:1604
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                                                                            66⤵
                                                                                                                                                                                                                                                              PID:1568
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                                                                            65⤵
                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                            PID:1928
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                                                                          64⤵
                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                          PID:2252
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                                                                        63⤵
                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                        PID:1336
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                                                                      62⤵
                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                      PID:1076
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                                                                    61⤵
                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                    PID:2524
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                                                                  60⤵
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                  PID:1620
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                                                                59⤵
                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                PID:2208
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                                                              58⤵
                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                              PID:496
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                                                            57⤵
                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                            PID:1304
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                                                          56⤵
                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                          PID:2940
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                                                        55⤵
                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                        PID:2340
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                                                      54⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:1344
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                                                    53⤵
                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                    PID:1720
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                                                  52⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                  PID:1804
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                                                51⤵
                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                PID:2328
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                                              50⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                              PID:568
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                                            49⤵
                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                            PID:1716
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                                          48⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:1892
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                                        47⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:1236
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                                      46⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                      PID:2692
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                                    45⤵
                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                    PID:2260
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                                  44⤵
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                  PID:2208
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                                43⤵
                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                PID:2196
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                              42⤵
                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                              PID:2744
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                            41⤵
                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                            PID:2684
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                          40⤵
                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                          PID:1484
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                        39⤵
                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                        PID:2336
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                      38⤵
                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                      PID:1720
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                    37⤵
                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                    PID:1340
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                  36⤵
                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                  PID:1808
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                                35⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                PID:1744
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                              34⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                              PID:952
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                            33⤵
                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                            PID:3028
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                          32⤵
                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                          PID:2056
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                        31⤵
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                        PID:996
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                      30⤵
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                      PID:656
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                    29⤵
                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                    PID:2664
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                  28⤵
                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                  PID:2668
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                                27⤵
                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                PID:2860
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                              26⤵
                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                              PID:2820
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                            25⤵
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                            PID:2272
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                          24⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                          PID:2964
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                        23⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                        PID:1756
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                      22⤵
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                      PID:2412
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                    21⤵
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                    PID:2224
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                  20⤵
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                  PID:1000
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                                19⤵
                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                PID:1848
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                              18⤵
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                              PID:1676
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                            17⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                            PID:1752
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                          16⤵
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                          PID:2584
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                        15⤵
                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                        PID:2660
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                      14⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                      PID:2620
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                    13⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                    PID:2760
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                  12⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                  PID:2544
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                                11⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                PID:1604
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                              10⤵
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                              PID:336
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                            9⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                            PID:1340
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                          8⤵
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:1100
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                        7⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                        PID:2152
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                      6⤵
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                      PID:2268
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                    5⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                    PID:1060
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                  4⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                  PID:3060
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                                3⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:2304
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\start.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\start.exe"
                                                                                                                              2⤵
                                                                                                                              • Drops startup file
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Adds Run key to start application
                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                                              PID:2384
                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\start.exe'
                                                                                                                                3⤵
                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:2808
                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'start.exe'
                                                                                                                                3⤵
                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:2908
                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\chrome.exe'
                                                                                                                                3⤵
                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:2616
                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'chrome.exe'
                                                                                                                                3⤵
                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:1256

                                                                                                                          Network

                                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                                          Replay Monitor

                                                                                                                          Loading Replay Monitor...

                                                                                                                          Downloads

                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\start.exe

                                                                                                                            Filesize

                                                                                                                            39KB

                                                                                                                            MD5

                                                                                                                            51e4348a35c9b40b0136fa204442f9c2

                                                                                                                            SHA1

                                                                                                                            aea47a3a717ca9cce49966093def7d8f5a53709a

                                                                                                                            SHA256

                                                                                                                            a8047efe920772b13508683a7d80de379b0cf2dc40b39a9cd37f949de6a90479

                                                                                                                            SHA512

                                                                                                                            f15353f1b29ead57efe865935ef0cbd9efa2f0e81e47a92993279a59ea4174fde1e9bb2546c35deda6cfa641cfa0ecd58f8a2f6006f0589ce95553d7debfa3bd

                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                            Filesize

                                                                                                                            7KB

                                                                                                                            MD5

                                                                                                                            d85e15801d480807b4dbee7bcacf9a20

                                                                                                                            SHA1

                                                                                                                            8b6c1da11c245eb0d34a5d843540e3dd431007b9

                                                                                                                            SHA256

                                                                                                                            671a605a87403254217b668ca37963430e4026d21c2f5d9e447d9d2ae8b6f2d1

                                                                                                                            SHA512

                                                                                                                            a135e013406d6148fa53806b8f213d4f9daaba59d5ae504a428b98dfa0722e07beb5042cb7bc91649581eeedb7f20607b46b5eabbe80713e51b35f487d4123bc

                                                                                                                          • memory/2384-9-0x00000000011E0000-0x00000000011F0000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            64KB

                                                                                                                          • memory/2508-8-0x000007FEF5100000-0x000007FEF5AEC000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            9.9MB

                                                                                                                          • memory/2508-12-0x000007FEF5100000-0x000007FEF5AEC000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            9.9MB

                                                                                                                          • memory/2516-2-0x000007FEF5100000-0x000007FEF5AEC000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            9.9MB

                                                                                                                          • memory/2516-10-0x000007FEF5100000-0x000007FEF5AEC000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            9.9MB

                                                                                                                          • memory/2516-0-0x000007FEF5103000-0x000007FEF5104000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            4KB

                                                                                                                          • memory/2516-1-0x0000000000990000-0x0000000001146000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            7.7MB

                                                                                                                          • memory/2808-17-0x000000001B660000-0x000000001B942000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            2.9MB

                                                                                                                          • memory/2808-18-0x0000000002010000-0x0000000002018000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            32KB

                                                                                                                          • memory/2908-24-0x000000001B600000-0x000000001B8E2000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            2.9MB

                                                                                                                          • memory/2908-25-0x0000000001D20000-0x0000000001D28000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            32KB