Analysis

  • max time kernel
    900s
  • max time network
    901s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250217-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    06/03/2025, 18:07

General

  • Target

    15415145.exe

  • Size

    59KB

  • MD5

    6c091ad6fae0fa76f44870d1a1b05cb4

  • SHA1

    040f60c0ee3f4902f919025057e34ab4d11b1abd

  • SHA256

    c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

  • SHA512

    3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

  • SSDEEP

    1536:skyZtyUQ8sBkROLW+UzbTH3gfm2qt0OgSko7:skItfQ8sBkROUzbTQf+6OgK7

Malware Config

Extracted

Family

xworm

Version

3.1

C2

known-savage.gl.at.ply.gg:45116

association-lectures.gl.at.ply.gg:32463

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain
aes.plain

Signatures

  • Detect Xworm Payload 22 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 9 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 16 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 9 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\15415145.exe
    "C:\Users\Admin\AppData\Local\Temp\15415145.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "15415145" /tr "C:\Users\Admin\AppData\Roaming\15415145.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2236
    • C:\Users\Admin\AppData\Local\Temp\yikkpq.exe
      "C:\Users\Admin\AppData\Local\Temp\yikkpq.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4124
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\yikkpq.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:696
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'yikkpq.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:944
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\yikkpq.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1596
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "yikkpq" /tr "C:\Users\Admin\AppData\Roaming\yikkpq.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:552
      • C:\Users\Admin\AppData\Local\Temp\zedsrj.exe
        "C:\Users\Admin\AppData\Local\Temp\zedsrj.exe"
        3⤵
        • Executes dropped EXE
        PID:2440
      • C:\Users\Admin\AppData\Local\Temp\fmirwq.exe
        "C:\Users\Admin\AppData\Local\Temp\fmirwq.exe"
        3⤵
        • Executes dropped EXE
        PID:4732
      • C:\Users\Admin\AppData\Local\Temp\kczhjn.exe
        "C:\Users\Admin\AppData\Local\Temp\kczhjn.exe"
        3⤵
        • Executes dropped EXE
        PID:2220
      • C:\Users\Admin\AppData\Local\Temp\nljgni.exe
        "C:\Users\Admin\AppData\Local\Temp\nljgni.exe"
        3⤵
        • Executes dropped EXE
        PID:2584
    • C:\Users\Admin\AppData\Local\Temp\pmbwnn.exe
      "C:\Users\Admin\AppData\Local\Temp\pmbwnn.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1376
    • C:\Users\Admin\AppData\Local\Temp\ucgibc.exe
      "C:\Users\Admin\AppData\Local\Temp\ucgibc.exe"
      2⤵
      • Executes dropped EXE
      PID:232
    • C:\Users\Admin\AppData\Local\Temp\uhvhrm.exe
      "C:\Users\Admin\AppData\Local\Temp\uhvhrm.exe"
      2⤵
      • Executes dropped EXE
      PID:1548
    • C:\Users\Admin\AppData\Local\Temp\rqpiaq.exe
      "C:\Users\Admin\AppData\Local\Temp\rqpiaq.exe"
      2⤵
      • Executes dropped EXE
      PID:1972
    • C:\Users\Admin\AppData\Local\Temp\ffhiln.exe
      "C:\Users\Admin\AppData\Local\Temp\ffhiln.exe"
      2⤵
      • Executes dropped EXE
      PID:2216
    • C:\Users\Admin\AppData\Local\Temp\rjnowb.exe
      "C:\Users\Admin\AppData\Local\Temp\rjnowb.exe"
      2⤵
      • Executes dropped EXE
      PID:188
    • C:\Users\Admin\AppData\Local\Temp\hhrgbr.exe
      "C:\Users\Admin\AppData\Local\Temp\hhrgbr.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:5112
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "hhrgbr" /tr "C:\Users\Admin\AppData\Roaming\hhrgbr.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1532
      • C:\Users\Admin\AppData\Local\Temp\nsefkc.exe
        "C:\Users\Admin\AppData\Local\Temp\nsefkc.exe"
        3⤵
        • Executes dropped EXE
        PID:2152
      • C:\Users\Admin\AppData\Local\Temp\eurxal.exe
        "C:\Users\Admin\AppData\Local\Temp\eurxal.exe"
        3⤵
        • Executes dropped EXE
        PID:2088
      • C:\Users\Admin\AppData\Local\Temp\jfvqkh.exe
        "C:\Users\Admin\AppData\Local\Temp\jfvqkh.exe"
        3⤵
        • Executes dropped EXE
        PID:3852
      • C:\Users\Admin\AppData\Local\Temp\lbnkvp.exe
        "C:\Users\Admin\AppData\Local\Temp\lbnkvp.exe"
        3⤵
        • Checks computer location settings
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4948
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "lbnkvp" /tr "C:\Users\Admin\AppData\Roaming\lbnkvp.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2584
        • C:\Users\Admin\AppData\Local\Temp\gclfwe.exe
          "C:\Users\Admin\AppData\Local\Temp\gclfwe.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          PID:1068
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "gclfwe" /tr "C:\Users\Admin\AppData\Roaming\gclfwe.exe"
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2404
          • C:\Users\Admin\AppData\Local\Temp\upvjdp.exe
            "C:\Users\Admin\AppData\Local\Temp\upvjdp.exe"
            5⤵
              PID:1692
            • C:\Users\Admin\AppData\Local\Temp\qzbaau.exe
              "C:\Users\Admin\AppData\Local\Temp\qzbaau.exe"
              5⤵
                PID:4876
              • C:\Users\Admin\AppData\Local\Temp\uzxcvc.exe
                "C:\Users\Admin\AppData\Local\Temp\uzxcvc.exe"
                5⤵
                  PID:5084
                • C:\Users\Admin\AppData\Local\Temp\lokmar.exe
                  "C:\Users\Admin\AppData\Local\Temp\lokmar.exe"
                  5⤵
                    PID:1148
                  • C:\Users\Admin\AppData\Local\Temp\mapdfj.exe
                    "C:\Users\Admin\AppData\Local\Temp\mapdfj.exe"
                    5⤵
                      PID:4464
                    • C:\Users\Admin\AppData\Local\Temp\khrhyf.exe
                      "C:\Users\Admin\AppData\Local\Temp\khrhyf.exe"
                      5⤵
                        PID:2440
                      • C:\Users\Admin\AppData\Local\Temp\odrama.exe
                        "C:\Users\Admin\AppData\Local\Temp\odrama.exe"
                        5⤵
                          PID:1860
                        • C:\Users\Admin\AppData\Local\Temp\kirmnz.exe
                          "C:\Users\Admin\AppData\Local\Temp\kirmnz.exe"
                          5⤵
                            PID:932
                          • C:\Users\Admin\AppData\Local\Temp\dxyhka.exe
                            "C:\Users\Admin\AppData\Local\Temp\dxyhka.exe"
                            5⤵
                              PID:3200
                            • C:\Users\Admin\AppData\Local\Temp\qhodxd.exe
                              "C:\Users\Admin\AppData\Local\Temp\qhodxd.exe"
                              5⤵
                                PID:400
                              • C:\Users\Admin\AppData\Local\Temp\anusps.exe
                                "C:\Users\Admin\AppData\Local\Temp\anusps.exe"
                                5⤵
                                  PID:2176
                                • C:\Users\Admin\AppData\Local\Temp\cnbsnr.exe
                                  "C:\Users\Admin\AppData\Local\Temp\cnbsnr.exe"
                                  5⤵
                                    PID:3760
                                  • C:\Users\Admin\AppData\Local\Temp\llckcr.exe
                                    "C:\Users\Admin\AppData\Local\Temp\llckcr.exe"
                                    5⤵
                                      PID:4864
                                    • C:\Users\Admin\AppData\Local\Temp\azmpah.exe
                                      "C:\Users\Admin\AppData\Local\Temp\azmpah.exe"
                                      5⤵
                                        PID:2208
                                      • C:\Users\Admin\AppData\Local\Temp\kcwrqr.exe
                                        "C:\Users\Admin\AppData\Local\Temp\kcwrqr.exe"
                                        5⤵
                                          PID:1356
                                        • C:\Users\Admin\AppData\Local\Temp\qkgnzy.exe
                                          "C:\Users\Admin\AppData\Local\Temp\qkgnzy.exe"
                                          5⤵
                                            PID:192
                                          • C:\Users\Admin\AppData\Local\Temp\frsyja.exe
                                            "C:\Users\Admin\AppData\Local\Temp\frsyja.exe"
                                            5⤵
                                              PID:4084
                                            • C:\Users\Admin\AppData\Local\Temp\ykjhwz.exe
                                              "C:\Users\Admin\AppData\Local\Temp\ykjhwz.exe"
                                              5⤵
                                                PID:3400
                                              • C:\Users\Admin\AppData\Local\Temp\ygexdy.exe
                                                "C:\Users\Admin\AppData\Local\Temp\ygexdy.exe"
                                                5⤵
                                                  PID:2784
                                                • C:\Users\Admin\AppData\Local\Temp\qkmmin.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\qkmmin.exe"
                                                  5⤵
                                                    PID:4292
                                                  • C:\Users\Admin\AppData\Local\Temp\vlxkcd.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\vlxkcd.exe"
                                                    5⤵
                                                      PID:1452
                                                  • C:\Users\Admin\AppData\Local\Temp\jbhgog.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\jbhgog.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    PID:1408
                                                  • C:\Users\Admin\AppData\Local\Temp\hcmcgu.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\hcmcgu.exe"
                                                    4⤵
                                                    • Checks computer location settings
                                                    • Drops startup file
                                                    • Executes dropped EXE
                                                    • Adds Run key to start application
                                                    PID:1672
                                                    • C:\Windows\System32\schtasks.exe
                                                      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "hcmcgu" /tr "C:\Users\Admin\AppData\Roaming\hcmcgu.exe"
                                                      5⤵
                                                      • Scheduled Task/Job: Scheduled Task
                                                      PID:3576
                                                    • C:\Users\Admin\AppData\Local\Temp\krihsh.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\krihsh.exe"
                                                      5⤵
                                                        PID:4092
                                                      • C:\Users\Admin\AppData\Local\Temp\hjgquh.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\hjgquh.exe"
                                                        5⤵
                                                          PID:2184
                                                        • C:\Users\Admin\AppData\Local\Temp\ztalgf.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\ztalgf.exe"
                                                          5⤵
                                                            PID:4856
                                                          • C:\Users\Admin\AppData\Local\Temp\tkwvje.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\tkwvje.exe"
                                                            5⤵
                                                            • Checks computer location settings
                                                            • Drops startup file
                                                            • Adds Run key to start application
                                                            PID:3408
                                                            • C:\Windows\System32\schtasks.exe
                                                              "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "tkwvje" /tr "C:\Users\Admin\AppData\Roaming\tkwvje.exe"
                                                              6⤵
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:1548
                                                            • C:\Users\Admin\AppData\Local\Temp\xtkesq.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\xtkesq.exe"
                                                              6⤵
                                                                PID:4300
                                                              • C:\Users\Admin\AppData\Local\Temp\bxqsrd.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\bxqsrd.exe"
                                                                6⤵
                                                                  PID:4864
                                                                • C:\Users\Admin\AppData\Local\Temp\mdamfk.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\mdamfk.exe"
                                                                  6⤵
                                                                    PID:2292
                                                                  • C:\Users\Admin\AppData\Local\Temp\vmwiyr.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\vmwiyr.exe"
                                                                    6⤵
                                                                      PID:4992
                                                                    • C:\Users\Admin\AppData\Local\Temp\psvbhf.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\psvbhf.exe"
                                                                      6⤵
                                                                        PID:4272
                                                                      • C:\Users\Admin\AppData\Local\Temp\ckwopt.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\ckwopt.exe"
                                                                        6⤵
                                                                          PID:2832
                                                                        • C:\Users\Admin\AppData\Local\Temp\klahbf.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\klahbf.exe"
                                                                          6⤵
                                                                          • Checks computer location settings
                                                                          • Drops startup file
                                                                          • Adds Run key to start application
                                                                          PID:5000
                                                                          • C:\Windows\System32\schtasks.exe
                                                                            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "klahbf" /tr "C:\Users\Admin\AppData\Roaming\klahbf.exe"
                                                                            7⤵
                                                                            • Scheduled Task/Job: Scheduled Task
                                                                            PID:4164
                                                                          • C:\Users\Admin\AppData\Local\Temp\xcljns.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\xcljns.exe"
                                                                            7⤵
                                                                              PID:4516
                                                                            • C:\Users\Admin\AppData\Local\Temp\tzijwx.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\tzijwx.exe"
                                                                              7⤵
                                                                                PID:1664
                                                                              • C:\Users\Admin\AppData\Local\Temp\bebmcq.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\bebmcq.exe"
                                                                                7⤵
                                                                                  PID:2636
                                                                                • C:\Users\Admin\AppData\Local\Temp\uocbvc.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\uocbvc.exe"
                                                                                  7⤵
                                                                                    PID:3824
                                                                                • C:\Users\Admin\AppData\Local\Temp\jpcbdi.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\jpcbdi.exe"
                                                                                  6⤵
                                                                                    PID:220
                                                                                  • C:\Users\Admin\AppData\Local\Temp\twupml.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\twupml.exe"
                                                                                    6⤵
                                                                                      PID:4448
                                                                                    • C:\Users\Admin\AppData\Local\Temp\dpvsoa.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\dpvsoa.exe"
                                                                                      6⤵
                                                                                      • Checks computer location settings
                                                                                      • Drops startup file
                                                                                      • Adds Run key to start application
                                                                                      PID:868
                                                                                      • C:\Windows\System32\schtasks.exe
                                                                                        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "dpvsoa" /tr "C:\Users\Admin\AppData\Roaming\dpvsoa.exe"
                                                                                        7⤵
                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                        PID:3416
                                                                                      • C:\Users\Admin\AppData\Local\Temp\xjptqn.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\xjptqn.exe"
                                                                                        7⤵
                                                                                          PID:4776
                                                                                      • C:\Users\Admin\AppData\Local\Temp\uaqkph.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\uaqkph.exe"
                                                                                        6⤵
                                                                                          PID:1880
                                                                                        • C:\Users\Admin\AppData\Local\Temp\hyngbu.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\hyngbu.exe"
                                                                                          6⤵
                                                                                            PID:4436
                                                                                          • C:\Users\Admin\AppData\Local\Temp\knkrzi.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\knkrzi.exe"
                                                                                            6⤵
                                                                                              PID:1116
                                                                                          • C:\Users\Admin\AppData\Local\Temp\qottoy.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\qottoy.exe"
                                                                                            5⤵
                                                                                              PID:3032
                                                                                            • C:\Users\Admin\AppData\Local\Temp\ksirqb.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\ksirqb.exe"
                                                                                              5⤵
                                                                                                PID:1544
                                                                                              • C:\Users\Admin\AppData\Local\Temp\kaxmyw.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\kaxmyw.exe"
                                                                                                5⤵
                                                                                                  PID:3324
                                                                                                • C:\Users\Admin\AppData\Local\Temp\uvrxgy.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\uvrxgy.exe"
                                                                                                  5⤵
                                                                                                    PID:1224
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\xorrxe.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\xorrxe.exe"
                                                                                                    5⤵
                                                                                                      PID:2780
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\hoiere.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\hoiere.exe"
                                                                                                      5⤵
                                                                                                        PID:3604
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\novhfb.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\novhfb.exe"
                                                                                                        5⤵
                                                                                                          PID:4580
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\zhczbf.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\zhczbf.exe"
                                                                                                          5⤵
                                                                                                            PID:4932
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\hhmzao.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\hhmzao.exe"
                                                                                                            5⤵
                                                                                                              PID:2396
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\mthuvz.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\mthuvz.exe"
                                                                                                              5⤵
                                                                                                                PID:4992
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\htudkb.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\htudkb.exe"
                                                                                                                5⤵
                                                                                                                  PID:4576
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tfjtzj.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\tfjtzj.exe"
                                                                                                                  5⤵
                                                                                                                    PID:1516
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\bnppxy.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\bnppxy.exe"
                                                                                                                    5⤵
                                                                                                                      PID:1092
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\wynljq.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\wynljq.exe"
                                                                                                                      5⤵
                                                                                                                        PID:216
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\riousy.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\riousy.exe"
                                                                                                                        5⤵
                                                                                                                          PID:3856
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\hxmume.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\hxmume.exe"
                                                                                                                        4⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        PID:2592
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\hiudvo.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\hiudvo.exe"
                                                                                                                        4⤵
                                                                                                                          PID:2784
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\mqqydr.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\mqqydr.exe"
                                                                                                                          4⤵
                                                                                                                            PID:1884
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\lpmbra.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\lpmbra.exe"
                                                                                                                            4⤵
                                                                                                                              PID:4888
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\zilcrv.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\zilcrv.exe"
                                                                                                                              4⤵
                                                                                                                                PID:3568
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\dklupe.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\dklupe.exe"
                                                                                                                                4⤵
                                                                                                                                  PID:536
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ilqhxo.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ilqhxo.exe"
                                                                                                                                  4⤵
                                                                                                                                    PID:2312
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\kfgttx.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\kfgttx.exe"
                                                                                                                                    4⤵
                                                                                                                                      PID:516
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\pizvqr.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\pizvqr.exe"
                                                                                                                                      4⤵
                                                                                                                                        PID:1612
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\hggmvd.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\hggmvd.exe"
                                                                                                                                        4⤵
                                                                                                                                          PID:4360
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\teryal.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\teryal.exe"
                                                                                                                                          4⤵
                                                                                                                                            PID:2060
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\dralpr.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\dralpr.exe"
                                                                                                                                            4⤵
                                                                                                                                              PID:4296
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\adryql.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\adryql.exe"
                                                                                                                                              4⤵
                                                                                                                                                PID:1868
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tfonmi.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\tfonmi.exe"
                                                                                                                                                4⤵
                                                                                                                                                  PID:1756
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\vittnj.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\vittnj.exe"
                                                                                                                                                  4⤵
                                                                                                                                                    PID:4264
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\yvqnnt.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\yvqnnt.exe"
                                                                                                                                                    4⤵
                                                                                                                                                      PID:1212
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\xmfuqb.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\xmfuqb.exe"
                                                                                                                                                      4⤵
                                                                                                                                                        PID:4756
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\xdthum.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\xdthum.exe"
                                                                                                                                                        4⤵
                                                                                                                                                          PID:2380
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\zjqusp.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\zjqusp.exe"
                                                                                                                                                          4⤵
                                                                                                                                                            PID:2908
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\oqitny.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\oqitny.exe"
                                                                                                                                                          3⤵
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          PID:3092
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\rdotkr.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\rdotkr.exe"
                                                                                                                                                          3⤵
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          PID:4216
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\bhsvux.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\bhsvux.exe"
                                                                                                                                                          3⤵
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          PID:932
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ssjmpu.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\ssjmpu.exe"
                                                                                                                                                          3⤵
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          PID:4840
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ayuucv.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\ayuucv.exe"
                                                                                                                                                          3⤵
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          PID:5072
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\tcxpru.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\tcxpru.exe"
                                                                                                                                                          3⤵
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          PID:4444
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ukgsfx.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\ukgsfx.exe"
                                                                                                                                                          3⤵
                                                                                                                                                            PID:4936
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\xpvepd.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\xpvepd.exe"
                                                                                                                                                            3⤵
                                                                                                                                                              PID:1808
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\opgpsc.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\opgpsc.exe"
                                                                                                                                                              3⤵
                                                                                                                                                                PID:1156
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\fcaotp.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\fcaotp.exe"
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:3872
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ewasah.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ewasah.exe"
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:1196
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmqyak.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\tmqyak.exe"
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:2076
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\rzmlpa.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\rzmlpa.exe"
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:2436
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\yviqgm.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\yviqgm.exe"
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:4536
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\pdkujo.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\pdkujo.exe"
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:1776
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tgqqoj.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\tgqqoj.exe"
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:1580
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\xeonkd.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\xeonkd.exe"
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:516
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\mqpvys.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\mqpvys.exe"
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:3612
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\qunapx.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\qunapx.exe"
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:1752
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\hnpncx.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\hnpncx.exe"
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:3640
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\xzcbeu.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\xzcbeu.exe"
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:2576
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\talcok.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\talcok.exe"
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:4776
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\llkeeq.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\llkeeq.exe"
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:1700
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\xtesdp.exe
                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\xtesdp.exe"
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:1948
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\btqtja.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\btqtja.exe"
                                                                                                                                                                                              3⤵
                                                                                                                                                                                                PID:4936
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\jkxlhh.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\jkxlhh.exe"
                                                                                                                                                                                              2⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              PID:4028
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\yrqysz.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\yrqysz.exe"
                                                                                                                                                                                              2⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              PID:3256
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\agmlrh.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\agmlrh.exe"
                                                                                                                                                                                              2⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              PID:3840
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\glqsrr.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\glqsrr.exe"
                                                                                                                                                                                              2⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              PID:972
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\pgktzk.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\pgktzk.exe"
                                                                                                                                                                                              2⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              PID:3636
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\uloxzp.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\uloxzp.exe"
                                                                                                                                                                                              2⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              PID:3664
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\styzku.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\styzku.exe"
                                                                                                                                                                                              2⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              PID:4048
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\wtrnnp.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\wtrnnp.exe"
                                                                                                                                                                                              2⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              PID:4888
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\pwqkaq.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\pwqkaq.exe"
                                                                                                                                                                                              2⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              PID:3064
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\aqtfwb.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\aqtfwb.exe"
                                                                                                                                                                                              2⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              PID:4488
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\wesgdg.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\wesgdg.exe"
                                                                                                                                                                                              2⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              PID:5088
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\kdhwtx.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\kdhwtx.exe"
                                                                                                                                                                                              2⤵
                                                                                                                                                                                                PID:2656
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\jgbwwy.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\jgbwwy.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                  PID:2668
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\abtved.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\abtved.exe"
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                    PID:1380
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tklyxj.exe
                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\tklyxj.exe"
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                      PID:4080
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\wmxwdf.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\wmxwdf.exe"
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                        PID:2256
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\bppkdk.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\bppkdk.exe"
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                          PID:3248
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\iscsau.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\iscsau.exe"
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                            PID:2088
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\petvfu.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\petvfu.exe"
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                              PID:4312
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\hbaomt.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\hbaomt.exe"
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                PID:4984
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vlfxag.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\vlfxag.exe"
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                  PID:1324
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\zmcvug.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\zmcvug.exe"
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                    PID:4496
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ipyjnm.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\ipyjnm.exe"
                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                      PID:2068
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\abkrjs.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\abkrjs.exe"
                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                        PID:1852
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\pbgdpc.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\pbgdpc.exe"
                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                          PID:2072
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\fmdwor.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\fmdwor.exe"
                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                            PID:2052
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ekrvto.exe
                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ekrvto.exe"
                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                              PID:1916
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\rtjnmq.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\rtjnmq.exe"
                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                PID:3856
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\wynool.exe
                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\wynool.exe"
                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                  PID:2156
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\iecmiz.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\iecmiz.exe"
                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                    PID:3532
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                  PID:2380
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  PID:1492
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\yikkpq.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\yikkpq.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  PID:1544
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\yikkpq.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\yikkpq.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  PID:2372
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  PID:4764
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\yikkpq.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\yikkpq.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  PID:3800
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  PID:3960
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\yikkpq.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\yikkpq.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  PID:1092
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  PID:2404
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\yikkpq.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\yikkpq.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  PID:4784
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  PID:4624
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\yikkpq.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\yikkpq.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  PID:4256
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  PID:1884
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\hhrgbr.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\hhrgbr.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  PID:4292
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\yikkpq.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\yikkpq.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  PID:4984
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\hhrgbr.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\hhrgbr.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  PID:344
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  PID:3416
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\lbnkvp.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\lbnkvp.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  PID:1072
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\yikkpq.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\yikkpq.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  PID:4108
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\lbnkvp.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\lbnkvp.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  PID:5080
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\hhrgbr.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\hhrgbr.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  PID:1532
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  PID:1640
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\gclfwe.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\gclfwe.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                    PID:4504
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\gclfwe.exe
                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\gclfwe.exe"
                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                      PID:4464
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\yikkpq.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\yikkpq.exe"
                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      PID:1056
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\lbnkvp.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\lbnkvp.exe"
                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      PID:4972
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\hhrgbr.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\hhrgbr.exe"
                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      PID:4704
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      PID:2596
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\hcmcgu.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\hcmcgu.exe"
                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      PID:3604
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\gclfwe.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\gclfwe.exe"
                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                        PID:3436
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\yikkpq.exe
                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\yikkpq.exe"
                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                          PID:4980
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\lbnkvp.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\lbnkvp.exe"
                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                            PID:2416
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\hhrgbr.exe
                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\hhrgbr.exe"
                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                              PID:3388
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\hcmcgu.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\hcmcgu.exe"
                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                PID:4756
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                  PID:116
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\gclfwe.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\gclfwe.exe"
                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                    PID:3600
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\yikkpq.exe
                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\yikkpq.exe"
                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                      PID:4664
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\lbnkvp.exe
                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\lbnkvp.exe"
                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                        PID:4108
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\hhrgbr.exe
                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\hhrgbr.exe"
                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                          PID:2464
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\hcmcgu.exe
                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\hcmcgu.exe"
                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                            PID:1756
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                              PID:3880
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\tkwvje.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\tkwvje.exe"
                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                PID:3064
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\gclfwe.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\gclfwe.exe"
                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                  PID:2828
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\yikkpq.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\yikkpq.exe"
                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                    PID:4904
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\lbnkvp.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\lbnkvp.exe"
                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                      PID:4424
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\hhrgbr.exe
                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\hhrgbr.exe"
                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                        PID:4448
                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\hcmcgu.exe
                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\hcmcgu.exe"
                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                          PID:1932
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\tkwvje.exe
                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\tkwvje.exe"
                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                            PID:4936
                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                              PID:2400
                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\gclfwe.exe
                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\gclfwe.exe"
                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                PID:3704
                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\yikkpq.exe
                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\yikkpq.exe"
                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                  PID:2796
                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\lbnkvp.exe
                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\lbnkvp.exe"
                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                    PID:3856
                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\hhrgbr.exe
                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\hhrgbr.exe"
                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                      PID:4888
                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\hcmcgu.exe
                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\hcmcgu.exe"
                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                        PID:4420
                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\tkwvje.exe
                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\tkwvje.exe"
                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                          PID:2992
                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                            PID:3056
                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\klahbf.exe
                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\klahbf.exe"
                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                              PID:1776
                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\gclfwe.exe
                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\gclfwe.exe"
                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                PID:2520
                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\yikkpq.exe
                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\yikkpq.exe"
                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                  PID:2544
                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\klahbf.exe
                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\klahbf.exe"
                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                    PID:1248
                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\lbnkvp.exe
                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\lbnkvp.exe"
                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                      PID:1924
                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\hhrgbr.exe
                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\hhrgbr.exe"
                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                        PID:4568
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\hcmcgu.exe
                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\hcmcgu.exe"
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                          PID:2364
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\tkwvje.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\tkwvje.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                            PID:2288
                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                              PID:768
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\dpvsoa.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\dpvsoa.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                PID:4732

                                                                                                                                                                                                                                                                                                              Network

                                                                                                                                                                                                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                              Replay Monitor

                                                                                                                                                                                                                                                                                                              Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                              Downloads

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\15415145.exe.log

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                654B

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                11c6e74f0561678d2cf7fc075a6cc00c

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                535ee79ba978554abcb98c566235805e7ea18490

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                d39a78fabca39532fcb85ce908781a75132e1bd01cc50a3b290dd87127837d63

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                32c63d67bf512b42e7f57f71287b354200126cb417ef9d869c72e0b9388a7c2f5e3b61f303f1353baa1bf482d0f17e06e23c9f50b2f1babd4d958b6da19c40b0

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                3KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                3eb3833f769dd890afc295b977eab4b4

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                e857649b037939602c72ad003e5d3698695f436f

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                c67441dfa09f61bca500bb43407c56b8

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                5a56cf7cbeb48c109e2128c31b681fac3959157b

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                63082da456c124d0bc516d2161d1613db5f3008d903e4066d2c7b4e90b435f33

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                325de8b718b3a01df05e20e028c5882240e5fd2e96c771361b776312923ff178f27494a1f5249bf6d7365a99155eb8735a51366e85597008e6a10462e63ee0e8

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                864f03b514ed64c3f625920e04261534

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                f0d1ba46ed5a7b81b9658ed419db13e3e84fc3e6

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                88501610a6b5fa78e8d89378598787faf889c502bedeb122bced5ea668c09edc

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                7a4330b08e7fda9916ca6c0a90867f94a36a211fc6d39624e522c7a4b6d4ee478b9ad237a75dfa2823ac4f80fe9e4448c0a20c214abc8db216468d191301aea8

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5k1th05g.r5e.ps1

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                60B

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\dpvsoa.exe

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                161KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                760aa2ef40d31c55f0019cc916e9de48

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                0228e46ca0a0303bebf54a65bf5da8111c4de402

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                7ae58db4879d8daf291c5eab58ca9b49bc1b5c63153a02d175d83406a71a2806

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                ce85a4af522b22d696ff98e176e2f97280363ac5e4161e39dac8cb0404af8d20fc4efe0ddd9e39cfa07bef28b65960c9a56822c6436b715f37ec6df9bd512d04

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\gclfwe.exe

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                156KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                e2cf7cb958bda8d948e80bdb78d6e283

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                34c18cf619966914046b7a8f9070b0ee9ca0523d

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                07f878b812dc294a61fb6030dffab309e4a05bef322759a198f110aa88c3b402

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                3197a3a08069a2a33cea248503132dff4369efe6b83d13db61ef5be81e26f5c3f57ecba9c31e73754f321848dcf491f19eb0249f5f182c2332ae0879ed84b56c

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\hcmcgu.exe

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                152KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                c0a4054bc0a6553d3a246d91e6cdc95b

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                b8722a0cf5483539ce965098fb299ad129d1a36b

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                0c20402e4957de72ae5e6c5ce00d0dfab6a49affb260996b3290d44264977909

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                5f5e88e876e6363992cd28794203874d27fc204bc7df004d32bfa18ebd0797c8c89ccb6b4cc44d4bdf6a9b476d5be5bec2a91bdc7020ba7b3628b98c9587ea5e

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\hhrgbr.exe

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                159KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                49a6b6e8627762b929999b0b1fe6d604

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                4a47bbb17c6cbda79794428df97d203b7261af79

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                ca6aa52d419303376de2c37b4c8f6bdd41e31e55de6d178520ad5056303b6571

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                c967dcb9be6b1fa73f1ef50a7785c17919365857be63923c6cad53362931d9a1c9fb41a43d68a050ad2a50239580fc8294e61e2ba10ee19d185f4f91c035b85b

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\klahbf.exe

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                161KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                a2e166ef9ba63b78150b9e08767d0764

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                885c223c8436ee6184f6335f3bcf7bd761e85319

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                0626693b0820897af0b56b9092439ce955a2435b610127d1686ea256eddc230f

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                04651a2f9f4d648b95e7a5e67a1e1ddbaa12d8d2d1fecbf2da956b58826ad2f0aee2b1e182b1beab3f73215185f7c402df67fed4e0bcf401a2eea64ec34c627b

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\krihsh.exe

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                30KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                d8a05fae946f16dbb12d5489f2b68230

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                f8068ceb85905539ed39dc4dc187088487b09e17

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                7876b3d0721a40d4d80f873be9ff79e722e28bd24ba0ee9ab9faac5c7aa69899

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                661fc778e40c260756d928fe3bed91c3cbc8884ac27a071e1bf3c8f97c9133bd4bd853371baed477a3988305c12e1c405d03059f8652d810a23eb6050f6ade77

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\lbnkvp.exe

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                166KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                7a7586c1278ecdb7881a3b34f841b722

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                8c991bb42729a7e34a096f9d3b23e7e0a25329a8

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                e2e527d70759106b6d1f479d0a1edd99d9b57c7fdfde2fffd1705e2161438a7f

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                79ddd9f08587767ab6b2b66fa7873b0de9a51b8ee52abe8b9ed7e7cf9c42ddd3e45069e978bde40e1708c44a7d8c6a5c271e1dd7129501227dcd8dc5477872b2

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tkwvje.exe

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                151KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                5cdc9671612660bd34747c635218a649

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                8cebfbdfc27689d9988d4512da7d855c13eb8e0b

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                119b3e5a0b2aad4dc9a6a7376dde77e80826830a24a08aefd858710e79a11db9

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                a33bfb9c9db6469274a38bee8038fa7a86b2e336e48776bee788b7b2b372556b5880253cdc7856339130ca8b29c199a739020e78ca29cc401f441e2ac18280ef

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\xjptqn.exe

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                159KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                c73cfd1942fdfaf5d6f3940ca42bbadd

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                9c9424953c85d03daf296d7841577228d15e1884

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                3d735b082f087b25561d293d17a6cda64326f3d48c1db53a2941ded1afc78773

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                9d7ce397b67e704773f7a9ea6c9cd1e5345f2211a67ac5dd5f622118690ed295a18e763c47e5c208240f71d4bedb67ba1e869faff466602f8e97350f9df9495c

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\yikkpq.exe

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                34KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                950d739da650457fab6a225545794238

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                e965286161ecda1b8c0072d8a2d80c191bb15705

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                a571fcac5384158c4927e7c7cf07182b68eccf67845ba927beae44cd9835e3f8

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                b7b91343176c5a7f6408b21fbc96c23d0b02c080b846e29f304ba91de1d0f37a772953e7ab65d1d627cb3490fbef3b85681564e878d8dcda57c0897dbad1d19b

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\15415145.exe

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                59KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                6c091ad6fae0fa76f44870d1a1b05cb4

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                040f60c0ee3f4902f919025057e34ab4d11b1abd

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

                                                                                                                                                                                                                                                                                                              • memory/696-38-0x0000019D9A620000-0x0000019D9A642000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                136KB

                                                                                                                                                                                                                                                                                                              • memory/868-1617-0x00000000006B0000-0x00000000006DE000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                184KB

                                                                                                                                                                                                                                                                                                              • memory/1252-0-0x00007FFDBEC43000-0x00007FFDBEC45000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                8KB

                                                                                                                                                                                                                                                                                                              • memory/1252-11-0x00007FFDBEC40000-0x00007FFDBF702000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                10.8MB

                                                                                                                                                                                                                                                                                                              • memory/1252-10-0x00007FFDBEC40000-0x00007FFDBF702000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                10.8MB

                                                                                                                                                                                                                                                                                                              • memory/1252-1-0x0000000000580000-0x0000000000596000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                88KB

                                                                                                                                                                                                                                                                                                              • memory/1672-563-0x00000000002B0000-0x00000000002DC000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                176KB

                                                                                                                                                                                                                                                                                                              • memory/2380-16-0x00007FFDBEC40000-0x00007FFDBF702000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                10.8MB

                                                                                                                                                                                                                                                                                                              • memory/2380-14-0x00007FFDBEC40000-0x00007FFDBF702000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                10.8MB

                                                                                                                                                                                                                                                                                                              • memory/3408-825-0x0000000000070000-0x000000000009C000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                176KB

                                                                                                                                                                                                                                                                                                              • memory/4092-662-0x00000000006A0000-0x00000000006AE000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                56KB

                                                                                                                                                                                                                                                                                                              • memory/4124-32-0x00000000006D0000-0x00000000006DE000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                56KB

                                                                                                                                                                                                                                                                                                              • memory/4776-1867-0x0000000000990000-0x00000000009BE000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                184KB

                                                                                                                                                                                                                                                                                                              • memory/4888-490-0x0000000000B40000-0x0000000000B6E000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                184KB

                                                                                                                                                                                                                                                                                                              • memory/4948-390-0x00000000006B0000-0x00000000006E0000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                192KB

                                                                                                                                                                                                                                                                                                              • memory/5000-1401-0x0000000000230000-0x000000000025E000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                184KB

                                                                                                                                                                                                                                                                                                              • memory/5112-255-0x0000000000A00000-0x0000000000A2E000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                184KB