Analysis

  • max time kernel
    900s
  • max time network
    900s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2025, 18:07

General

  • Target

    15415145.exe

  • Size

    59KB

  • MD5

    6c091ad6fae0fa76f44870d1a1b05cb4

  • SHA1

    040f60c0ee3f4902f919025057e34ab4d11b1abd

  • SHA256

    c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

  • SHA512

    3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

  • SSDEEP

    1536:skyZtyUQ8sBkROLW+UzbTH3gfm2qt0OgSko7:skItfQ8sBkROUzbTQf+6OgK7

Malware Config

Extracted

Family

xworm

Version

3.1

C2

known-savage.gl.at.ply.gg:45116

association-lectures.gl.at.ply.gg:32463

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain
aes.plain

Signatures

  • Detect Xworm Payload 22 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 9 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 18 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 9 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\15415145.exe
    "C:\Users\Admin\AppData\Local\Temp\15415145.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "15415145" /tr "C:\Users\Admin\AppData\Roaming\15415145.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:3036
    • C:\Users\Admin\AppData\Local\Temp\otgqcv.exe
      "C:\Users\Admin\AppData\Local\Temp\otgqcv.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3628
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\otgqcv.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4028
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'otgqcv.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1428
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\otgqcv.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:948
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "otgqcv" /tr "C:\Users\Admin\AppData\Roaming\otgqcv.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:980
      • C:\Users\Admin\AppData\Local\Temp\mgcjkj.exe
        "C:\Users\Admin\AppData\Local\Temp\mgcjkj.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1424
      • C:\Users\Admin\AppData\Local\Temp\vfeabw.exe
        "C:\Users\Admin\AppData\Local\Temp\vfeabw.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2004
      • C:\Users\Admin\AppData\Local\Temp\gefyok.exe
        "C:\Users\Admin\AppData\Local\Temp\gefyok.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2096
      • C:\Users\Admin\AppData\Local\Temp\pvcave.exe
        "C:\Users\Admin\AppData\Local\Temp\pvcave.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4576
    • C:\Users\Admin\AppData\Local\Temp\fdzups.exe
      "C:\Users\Admin\AppData\Local\Temp\fdzups.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1436
    • C:\Users\Admin\AppData\Local\Temp\mjlvqc.exe
      "C:\Users\Admin\AppData\Local\Temp\mjlvqc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:680
    • C:\Users\Admin\AppData\Local\Temp\crygxk.exe
      "C:\Users\Admin\AppData\Local\Temp\crygxk.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1516
    • C:\Users\Admin\AppData\Local\Temp\ddezol.exe
      "C:\Users\Admin\AppData\Local\Temp\ddezol.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1680
    • C:\Users\Admin\AppData\Local\Temp\gfycmz.exe
      "C:\Users\Admin\AppData\Local\Temp\gfycmz.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3912
    • C:\Users\Admin\AppData\Local\Temp\igowxt.exe
      "C:\Users\Admin\AppData\Local\Temp\igowxt.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3488
    • C:\Users\Admin\AppData\Local\Temp\hlvyoy.exe
      "C:\Users\Admin\AppData\Local\Temp\hlvyoy.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4488
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "hlvyoy" /tr "C:\Users\Admin\AppData\Roaming\hlvyoy.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:3632
      • C:\Users\Admin\AppData\Local\Temp\gshvju.exe
        "C:\Users\Admin\AppData\Local\Temp\gshvju.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4588
      • C:\Users\Admin\AppData\Local\Temp\cyjnph.exe
        "C:\Users\Admin\AppData\Local\Temp\cyjnph.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:5020
      • C:\Users\Admin\AppData\Local\Temp\tkrjbs.exe
        "C:\Users\Admin\AppData\Local\Temp\tkrjbs.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3408
      • C:\Users\Admin\AppData\Local\Temp\lfizdu.exe
        "C:\Users\Admin\AppData\Local\Temp\lfizdu.exe"
        3⤵
        • Checks computer location settings
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4504
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "lfizdu" /tr "C:\Users\Admin\AppData\Roaming\lfizdu.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:4280
        • C:\Users\Admin\AppData\Local\Temp\pcozkw.exe
          "C:\Users\Admin\AppData\Local\Temp\pcozkw.exe"
          4⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          PID:3600
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "pcozkw" /tr "C:\Users\Admin\AppData\Roaming\pcozkw.exe"
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:756
          • C:\Users\Admin\AppData\Local\Temp\dmfrub.exe
            "C:\Users\Admin\AppData\Local\Temp\dmfrub.exe"
            5⤵
            • Executes dropped EXE
            PID:412
          • C:\Users\Admin\AppData\Local\Temp\esdvjc.exe
            "C:\Users\Admin\AppData\Local\Temp\esdvjc.exe"
            5⤵
            • Executes dropped EXE
            PID:4460
          • C:\Users\Admin\AppData\Local\Temp\mohgev.exe
            "C:\Users\Admin\AppData\Local\Temp\mohgev.exe"
            5⤵
              PID:2208
            • C:\Users\Admin\AppData\Local\Temp\myrkct.exe
              "C:\Users\Admin\AppData\Local\Temp\myrkct.exe"
              5⤵
                PID:1916
              • C:\Users\Admin\AppData\Local\Temp\flegzm.exe
                "C:\Users\Admin\AppData\Local\Temp\flegzm.exe"
                5⤵
                  PID:2160
                • C:\Users\Admin\AppData\Local\Temp\qcdmbc.exe
                  "C:\Users\Admin\AppData\Local\Temp\qcdmbc.exe"
                  5⤵
                    PID:1860
                  • C:\Users\Admin\AppData\Local\Temp\pcbvdy.exe
                    "C:\Users\Admin\AppData\Local\Temp\pcbvdy.exe"
                    5⤵
                      PID:4872
                    • C:\Users\Admin\AppData\Local\Temp\ssswfn.exe
                      "C:\Users\Admin\AppData\Local\Temp\ssswfn.exe"
                      5⤵
                        PID:3848
                      • C:\Users\Admin\AppData\Local\Temp\ulytnn.exe
                        "C:\Users\Admin\AppData\Local\Temp\ulytnn.exe"
                        5⤵
                          PID:4616
                        • C:\Users\Admin\AppData\Local\Temp\lsklli.exe
                          "C:\Users\Admin\AppData\Local\Temp\lsklli.exe"
                          5⤵
                            PID:432
                          • C:\Users\Admin\AppData\Local\Temp\wytqfh.exe
                            "C:\Users\Admin\AppData\Local\Temp\wytqfh.exe"
                            5⤵
                              PID:2020
                            • C:\Users\Admin\AppData\Local\Temp\zznerb.exe
                              "C:\Users\Admin\AppData\Local\Temp\zznerb.exe"
                              5⤵
                                PID:1536
                              • C:\Users\Admin\AppData\Local\Temp\trutrj.exe
                                "C:\Users\Admin\AppData\Local\Temp\trutrj.exe"
                                5⤵
                                  PID:3224
                                • C:\Users\Admin\AppData\Local\Temp\bjgrmn.exe
                                  "C:\Users\Admin\AppData\Local\Temp\bjgrmn.exe"
                                  5⤵
                                    PID:1164
                                  • C:\Users\Admin\AppData\Local\Temp\nxoqbi.exe
                                    "C:\Users\Admin\AppData\Local\Temp\nxoqbi.exe"
                                    5⤵
                                      PID:1668
                                    • C:\Users\Admin\AppData\Local\Temp\seqsye.exe
                                      "C:\Users\Admin\AppData\Local\Temp\seqsye.exe"
                                      5⤵
                                        PID:868
                                      • C:\Users\Admin\AppData\Local\Temp\ecnkwg.exe
                                        "C:\Users\Admin\AppData\Local\Temp\ecnkwg.exe"
                                        5⤵
                                          PID:3536
                                        • C:\Users\Admin\AppData\Local\Temp\apuxzw.exe
                                          "C:\Users\Admin\AppData\Local\Temp\apuxzw.exe"
                                          5⤵
                                            PID:4828
                                          • C:\Users\Admin\AppData\Local\Temp\ssaajc.exe
                                            "C:\Users\Admin\AppData\Local\Temp\ssaajc.exe"
                                            5⤵
                                              PID:3536
                                            • C:\Users\Admin\AppData\Local\Temp\cfmgdi.exe
                                              "C:\Users\Admin\AppData\Local\Temp\cfmgdi.exe"
                                              5⤵
                                                PID:2416
                                              • C:\Users\Admin\AppData\Local\Temp\tjyemm.exe
                                                "C:\Users\Admin\AppData\Local\Temp\tjyemm.exe"
                                                5⤵
                                                  PID:3852
                                              • C:\Users\Admin\AppData\Local\Temp\gouzod.exe
                                                "C:\Users\Admin\AppData\Local\Temp\gouzod.exe"
                                                4⤵
                                                • Executes dropped EXE
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1500
                                              • C:\Users\Admin\AppData\Local\Temp\wjthpw.exe
                                                "C:\Users\Admin\AppData\Local\Temp\wjthpw.exe"
                                                4⤵
                                                • Checks computer location settings
                                                • Drops startup file
                                                • Executes dropped EXE
                                                • Adds Run key to start application
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:4536
                                                • C:\Windows\System32\schtasks.exe
                                                  "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "wjthpw" /tr "C:\Users\Admin\AppData\Roaming\wjthpw.exe"
                                                  5⤵
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:1752
                                                • C:\Users\Admin\AppData\Local\Temp\qbtauu.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\qbtauu.exe"
                                                  5⤵
                                                    PID:4768
                                                  • C:\Users\Admin\AppData\Local\Temp\bscsov.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\bscsov.exe"
                                                    5⤵
                                                      PID:1540
                                                    • C:\Users\Admin\AppData\Local\Temp\zcmzba.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\zcmzba.exe"
                                                      5⤵
                                                        PID:2372
                                                      • C:\Users\Admin\AppData\Local\Temp\nenecg.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\nenecg.exe"
                                                        5⤵
                                                        • Checks computer location settings
                                                        • Drops startup file
                                                        • Adds Run key to start application
                                                        PID:1188
                                                        • C:\Windows\System32\schtasks.exe
                                                          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "nenecg" /tr "C:\Users\Admin\AppData\Roaming\nenecg.exe"
                                                          6⤵
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:1632
                                                        • C:\Users\Admin\AppData\Local\Temp\rywegm.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\rywegm.exe"
                                                          6⤵
                                                            PID:4892
                                                          • C:\Users\Admin\AppData\Local\Temp\snuhjl.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\snuhjl.exe"
                                                            6⤵
                                                              PID:4356
                                                            • C:\Users\Admin\AppData\Local\Temp\sqskpx.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\sqskpx.exe"
                                                              6⤵
                                                                PID:2328
                                                              • C:\Users\Admin\AppData\Local\Temp\uqgzah.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\uqgzah.exe"
                                                                6⤵
                                                                  PID:3840
                                                                • C:\Users\Admin\AppData\Local\Temp\vaswns.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\vaswns.exe"
                                                                  6⤵
                                                                    PID:2124
                                                                  • C:\Users\Admin\AppData\Local\Temp\fwjhee.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\fwjhee.exe"
                                                                    6⤵
                                                                      PID:4444
                                                                    • C:\Users\Admin\AppData\Local\Temp\wqxlvz.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\wqxlvz.exe"
                                                                      6⤵
                                                                      • Checks computer location settings
                                                                      • Drops startup file
                                                                      • Adds Run key to start application
                                                                      PID:2420
                                                                      • C:\Windows\System32\schtasks.exe
                                                                        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "wqxlvz" /tr "C:\Users\Admin\AppData\Roaming\wqxlvz.exe"
                                                                        7⤵
                                                                        • Scheduled Task/Job: Scheduled Task
                                                                        PID:1924
                                                                      • C:\Users\Admin\AppData\Local\Temp\uvplms.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\uvplms.exe"
                                                                        7⤵
                                                                        • Checks computer location settings
                                                                        • Drops startup file
                                                                        • Adds Run key to start application
                                                                        PID:2204
                                                                        • C:\Windows\System32\schtasks.exe
                                                                          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "uvplms" /tr "C:\Users\Admin\AppData\Roaming\uvplms.exe"
                                                                          8⤵
                                                                          • Scheduled Task/Job: Scheduled Task
                                                                          PID:4376
                                                                        • C:\Users\Admin\AppData\Local\Temp\kkokjo.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\kkokjo.exe"
                                                                          8⤵
                                                                            PID:5112
                                                                        • C:\Users\Admin\AppData\Local\Temp\otdpvp.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\otdpvp.exe"
                                                                          7⤵
                                                                            PID:4776
                                                                          • C:\Users\Admin\AppData\Local\Temp\xondak.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\xondak.exe"
                                                                            7⤵
                                                                              PID:628
                                                                            • C:\Users\Admin\AppData\Local\Temp\hdztun.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\hdztun.exe"
                                                                              7⤵
                                                                                PID:216
                                                                            • C:\Users\Admin\AppData\Local\Temp\atphih.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\atphih.exe"
                                                                              6⤵
                                                                                PID:1932
                                                                              • C:\Users\Admin\AppData\Local\Temp\ujgsuo.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\ujgsuo.exe"
                                                                                6⤵
                                                                                  PID:5028
                                                                                • C:\Users\Admin\AppData\Local\Temp\urxpjg.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\urxpjg.exe"
                                                                                  6⤵
                                                                                    PID:1968
                                                                                  • C:\Users\Admin\AppData\Local\Temp\twabcm.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\twabcm.exe"
                                                                                    6⤵
                                                                                      PID:3920
                                                                                    • C:\Users\Admin\AppData\Local\Temp\bllooz.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\bllooz.exe"
                                                                                      6⤵
                                                                                        PID:2904
                                                                                    • C:\Users\Admin\AppData\Local\Temp\onmwsv.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\onmwsv.exe"
                                                                                      5⤵
                                                                                        PID:1148
                                                                                      • C:\Users\Admin\AppData\Local\Temp\xccmtr.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\xccmtr.exe"
                                                                                        5⤵
                                                                                          PID:1604
                                                                                        • C:\Users\Admin\AppData\Local\Temp\qxcbzi.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\qxcbzi.exe"
                                                                                          5⤵
                                                                                            PID:532
                                                                                          • C:\Users\Admin\AppData\Local\Temp\eiytkm.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\eiytkm.exe"
                                                                                            5⤵
                                                                                              PID:2744
                                                                                            • C:\Users\Admin\AppData\Local\Temp\slzmvm.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\slzmvm.exe"
                                                                                              5⤵
                                                                                                PID:3488
                                                                                              • C:\Users\Admin\AppData\Local\Temp\slzmmh.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\slzmmh.exe"
                                                                                                5⤵
                                                                                                  PID:2312
                                                                                                • C:\Users\Admin\AppData\Local\Temp\hezgul.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\hezgul.exe"
                                                                                                  5⤵
                                                                                                    PID:2232
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\smivjd.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\smivjd.exe"
                                                                                                    5⤵
                                                                                                      PID:5008
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\xlffat.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\xlffat.exe"
                                                                                                      5⤵
                                                                                                        PID:4140
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\iudadg.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\iudadg.exe"
                                                                                                        5⤵
                                                                                                          PID:4864
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\wkgqth.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\wkgqth.exe"
                                                                                                          5⤵
                                                                                                            PID:2344
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\sdluuu.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\sdluuu.exe"
                                                                                                            5⤵
                                                                                                              PID:2404
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ixnmbx.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\ixnmbx.exe"
                                                                                                              5⤵
                                                                                                                PID:4668
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\dxcvok.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\dxcvok.exe"
                                                                                                                5⤵
                                                                                                                  PID:5100
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\gnlfer.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\gnlfer.exe"
                                                                                                                  5⤵
                                                                                                                    PID:4908
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\pbqgcc.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\pbqgcc.exe"
                                                                                                                  4⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  PID:3996
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ktjnyd.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ktjnyd.exe"
                                                                                                                  4⤵
                                                                                                                    PID:4404
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\rufcbj.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\rufcbj.exe"
                                                                                                                    4⤵
                                                                                                                      PID:2004
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\nnuzwo.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\nnuzwo.exe"
                                                                                                                      4⤵
                                                                                                                        PID:1244
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\dmgttv.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\dmgttv.exe"
                                                                                                                        4⤵
                                                                                                                          PID:3568
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\dsrzvq.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\dsrzvq.exe"
                                                                                                                          4⤵
                                                                                                                            PID:1152
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ojzlor.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ojzlor.exe"
                                                                                                                            4⤵
                                                                                                                              PID:4204
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\nsprhu.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\nsprhu.exe"
                                                                                                                              4⤵
                                                                                                                                PID:3740
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\xuhjub.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\xuhjub.exe"
                                                                                                                                4⤵
                                                                                                                                  PID:2520
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\cpfbcp.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\cpfbcp.exe"
                                                                                                                                  4⤵
                                                                                                                                    PID:2684
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\wrznkg.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\wrznkg.exe"
                                                                                                                                    4⤵
                                                                                                                                      PID:5112
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\lryonr.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\lryonr.exe"
                                                                                                                                      4⤵
                                                                                                                                        PID:2204
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\jbzcmd.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\jbzcmd.exe"
                                                                                                                                        4⤵
                                                                                                                                          PID:4592
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ymelvz.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\ymelvz.exe"
                                                                                                                                          4⤵
                                                                                                                                            PID:860
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ntxqxg.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ntxqxg.exe"
                                                                                                                                            4⤵
                                                                                                                                              PID:4224
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\lmhkow.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\lmhkow.exe"
                                                                                                                                              4⤵
                                                                                                                                                PID:2644
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\szijfp.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\szijfp.exe"
                                                                                                                                                4⤵
                                                                                                                                                  PID:2324
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\wigqas.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\wigqas.exe"
                                                                                                                                                  4⤵
                                                                                                                                                    PID:4868
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\czcbdq.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\czcbdq.exe"
                                                                                                                                                    4⤵
                                                                                                                                                      PID:1528
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\klwzaq.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\klwzaq.exe"
                                                                                                                                                      4⤵
                                                                                                                                                        PID:3732
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\jzpxnj.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\jzpxnj.exe"
                                                                                                                                                      3⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                      PID:3060
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\kyrmit.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\kyrmit.exe"
                                                                                                                                                      3⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                      PID:64
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\hqftkw.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\hqftkw.exe"
                                                                                                                                                      3⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                      PID:840
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\sldtpm.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\sldtpm.exe"
                                                                                                                                                      3⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                      PID:4556
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\eujfeu.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\eujfeu.exe"
                                                                                                                                                      3⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      PID:3036
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\ygommk.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\ygommk.exe"
                                                                                                                                                      3⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      PID:4528
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\efkzcr.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\efkzcr.exe"
                                                                                                                                                      3⤵
                                                                                                                                                        PID:4004
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\qhcxcl.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\qhcxcl.exe"
                                                                                                                                                        3⤵
                                                                                                                                                          PID:2612
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\mrulgs.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\mrulgs.exe"
                                                                                                                                                          3⤵
                                                                                                                                                            PID:3920
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\qpkdss.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\qpkdss.exe"
                                                                                                                                                            3⤵
                                                                                                                                                              PID:4540
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\aftxob.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\aftxob.exe"
                                                                                                                                                              3⤵
                                                                                                                                                                PID:468
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\euevpf.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\euevpf.exe"
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:2000
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\msildh.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\msildh.exe"
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:3704
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\kgsxsn.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\kgsxsn.exe"
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:4272
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\zmawvw.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\zmawvw.exe"
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:1500
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\zbmszw.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\zbmszw.exe"
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:2304
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ystbti.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\ystbti.exe"
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:4036
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\gqcozo.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\gqcozo.exe"
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:4452
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\jflctm.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\jflctm.exe"
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:4216
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\admgxb.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\admgxb.exe"
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:3392
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\bhyhwn.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\bhyhwn.exe"
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:4496
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tttlnl.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\tttlnl.exe"
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:4532
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\oinkrc.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\oinkrc.exe"
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:1376
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\klmmnq.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\klmmnq.exe"
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:4572
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\xgsfrd.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\xgsfrd.exe"
                                                                                                                                                                                        2⤵
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                        PID:928
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\kiwwny.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\kiwwny.exe"
                                                                                                                                                                                        2⤵
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                        PID:1440
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\qgonoj.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\qgonoj.exe"
                                                                                                                                                                                        2⤵
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                        PID:4348
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\tjwlnj.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\tjwlnj.exe"
                                                                                                                                                                                        2⤵
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                        PID:4760
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\oftfym.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\oftfym.exe"
                                                                                                                                                                                        2⤵
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                        PID:1708
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\ofpgbi.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\ofpgbi.exe"
                                                                                                                                                                                        2⤵
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                        PID:3268
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\tbovse.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\tbovse.exe"
                                                                                                                                                                                        2⤵
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                        PID:2216
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\dltqgr.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\dltqgr.exe"
                                                                                                                                                                                        2⤵
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                        PID:3892
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\fuxmef.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\fuxmef.exe"
                                                                                                                                                                                        2⤵
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                        PID:724
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\bmtirm.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\bmtirm.exe"
                                                                                                                                                                                        2⤵
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        PID:1536
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\kfjkhh.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\kfjkhh.exe"
                                                                                                                                                                                        2⤵
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        PID:4676
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\jkegun.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\jkegun.exe"
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:412
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\vyqsib.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\vyqsib.exe"
                                                                                                                                                                                          2⤵
                                                                                                                                                                                            PID:5068
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\qxzbze.exe
                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\qxzbze.exe"
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:2204
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\pbbjfp.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\pbbjfp.exe"
                                                                                                                                                                                              2⤵
                                                                                                                                                                                                PID:4004
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\okjbln.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\okjbln.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                  PID:3768
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\utemhw.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\utemhw.exe"
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                    PID:448
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\nzzjrg.exe
                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\nzzjrg.exe"
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                      PID:4540
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\oidsst.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\oidsst.exe"
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                        PID:1376
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\niffvf.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\niffvf.exe"
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                          PID:4992
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\gzeprj.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\gzeprj.exe"
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                            PID:1804
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\dtndyo.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\dtndyo.exe"
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                              PID:2720
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\xdqdoa.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\xdqdoa.exe"
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                PID:2240
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ffkuvw.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ffkuvw.exe"
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                  PID:3840
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\lvsqoc.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\lvsqoc.exe"
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                    PID:4576
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\hoxygh.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\hoxygh.exe"
                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                      PID:2392
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\rxhpgx.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\rxhpgx.exe"
                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                        PID:2544
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\tkkovo.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\tkkovo.exe"
                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                          PID:1504
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ckufaq.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\ckufaq.exe"
                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                            PID:4580
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:2324
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:1360
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:4908
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:3088
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:1272
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:4412
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:4952
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:1968
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:2124
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:3088
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:4844
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:4864
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:3844
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\hlvyoy.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\hlvyoy.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:3892
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:1944
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\hlvyoy.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\hlvyoy.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:4404
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:4496
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\lfizdu.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\lfizdu.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:1700
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:452
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\hlvyoy.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\hlvyoy.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:3296
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:4724
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\lfizdu.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\lfizdu.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:764
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\pcozkw.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\pcozkw.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:4668
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          PID:1804
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\pcozkw.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\pcozkw.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          PID:4376
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\hlvyoy.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\hlvyoy.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                            PID:3892
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                              PID:4248
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\lfizdu.exe
                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\lfizdu.exe
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                PID:1268
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\wjthpw.exe
                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\wjthpw.exe
                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                  PID:1772
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\wjthpw.exe
                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\wjthpw.exe
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                    PID:1764
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                      PID:4624
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\pcozkw.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\pcozkw.exe
                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                        PID:1400
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\hlvyoy.exe
                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\hlvyoy.exe
                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                          PID:540
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                            PID:1796
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\lfizdu.exe
                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\lfizdu.exe
                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                              PID:4828
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\wjthpw.exe
                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\wjthpw.exe
                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                PID:1416
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                  PID:3056
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\pcozkw.exe
                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\pcozkw.exe
                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                    PID:4076
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\hlvyoy.exe
                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\hlvyoy.exe
                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                      PID:4816
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                        PID:1484
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\lfizdu.exe
                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\lfizdu.exe
                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                          PID:4764
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\nenecg.exe
                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\nenecg.exe
                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                            PID:2276
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\wjthpw.exe
                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\wjthpw.exe
                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                              PID:2448
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\nenecg.exe
                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\nenecg.exe
                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                PID:5028
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                  PID:1304
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\pcozkw.exe
                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\pcozkw.exe
                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                    PID:4824
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\hlvyoy.exe
                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\hlvyoy.exe
                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                      PID:4720
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                        PID:2272
                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\lfizdu.exe
                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\lfizdu.exe
                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                          PID:2392
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\wjthpw.exe
                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\wjthpw.exe
                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                            PID:3880
                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\nenecg.exe
                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\nenecg.exe
                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                              PID:3792
                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                PID:1656
                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\pcozkw.exe
                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\pcozkw.exe
                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                  PID:2096
                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\hlvyoy.exe
                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\hlvyoy.exe
                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                    PID:2308
                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                      PID:3464
                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\lfizdu.exe
                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\lfizdu.exe
                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                        PID:1484
                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\wqxlvz.exe
                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\wqxlvz.exe
                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                          PID:4056
                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\wqxlvz.exe
                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\wqxlvz.exe
                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                            PID:3432
                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\wjthpw.exe
                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\wjthpw.exe
                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                              PID:2120
                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\nenecg.exe
                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\nenecg.exe
                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                PID:920
                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\pcozkw.exe
                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\pcozkw.exe
                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                  PID:956
                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                    PID:3900
                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\hlvyoy.exe
                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\hlvyoy.exe
                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                      PID:1696
                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\otgqcv.exe
                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                        PID:4024
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\lfizdu.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\lfizdu.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                          PID:2920
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\uvplms.exe
                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\uvplms.exe
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                            PID:3656

                                                                                                                                                                                                                                                                                                          Network

                                                                                                                                                                                                                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                          Replay Monitor

                                                                                                                                                                                                                                                                                                          Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                          Downloads

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\15415145.exe.log

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            654B

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            2ff39f6c7249774be85fd60a8f9a245e

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            684ff36b31aedc1e587c8496c02722c6698c1c4e

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            2KB

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            944B

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            6d42b6da621e8df5674e26b799c8e2aa

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            944B

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            e58749a7a1826f6ea62df1e2ef63a32b

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            c0bca21658b8be4f37b71eec9578bfefa44f862d

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            0e1f0e684adb40a5d0668df5fed007c9046137d7ae16a1f2f343b139d5f9bc93

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            4cf45b2b11ab31e7f67fff286b29d50ed28cd6043091144c5c0f1348b5f5916ed7479cf985595e6f096b586ab93b4b5dce612f688049b8366a2dd91863e98b70

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_txu1luzt.4ur.ps1

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            60B

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\hdztun.exe

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            159KB

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            c73cfd1942fdfaf5d6f3940ca42bbadd

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            9c9424953c85d03daf296d7841577228d15e1884

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            3d735b082f087b25561d293d17a6cda64326f3d48c1db53a2941ded1afc78773

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            9d7ce397b67e704773f7a9ea6c9cd1e5345f2211a67ac5dd5f622118690ed295a18e763c47e5c208240f71d4bedb67ba1e869faff466602f8e97350f9df9495c

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\hlvyoy.exe

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            159KB

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            49a6b6e8627762b929999b0b1fe6d604

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            4a47bbb17c6cbda79794428df97d203b7261af79

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            ca6aa52d419303376de2c37b4c8f6bdd41e31e55de6d178520ad5056303b6571

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            c967dcb9be6b1fa73f1ef50a7785c17919365857be63923c6cad53362931d9a1c9fb41a43d68a050ad2a50239580fc8294e61e2ba10ee19d185f4f91c035b85b

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\lfizdu.exe

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            166KB

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            7a7586c1278ecdb7881a3b34f841b722

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            8c991bb42729a7e34a096f9d3b23e7e0a25329a8

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            e2e527d70759106b6d1f479d0a1edd99d9b57c7fdfde2fffd1705e2161438a7f

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            79ddd9f08587767ab6b2b66fa7873b0de9a51b8ee52abe8b9ed7e7cf9c42ddd3e45069e978bde40e1708c44a7d8c6a5c271e1dd7129501227dcd8dc5477872b2

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\nenecg.exe

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            151KB

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            5cdc9671612660bd34747c635218a649

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            8cebfbdfc27689d9988d4512da7d855c13eb8e0b

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            119b3e5a0b2aad4dc9a6a7376dde77e80826830a24a08aefd858710e79a11db9

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            a33bfb9c9db6469274a38bee8038fa7a86b2e336e48776bee788b7b2b372556b5880253cdc7856339130ca8b29c199a739020e78ca29cc401f441e2ac18280ef

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\otgqcv.exe

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            34KB

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            950d739da650457fab6a225545794238

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            e965286161ecda1b8c0072d8a2d80c191bb15705

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            a571fcac5384158c4927e7c7cf07182b68eccf67845ba927beae44cd9835e3f8

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            b7b91343176c5a7f6408b21fbc96c23d0b02c080b846e29f304ba91de1d0f37a772953e7ab65d1d627cb3490fbef3b85681564e878d8dcda57c0897dbad1d19b

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\pcozkw.exe

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            156KB

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            e2cf7cb958bda8d948e80bdb78d6e283

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            34c18cf619966914046b7a8f9070b0ee9ca0523d

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            07f878b812dc294a61fb6030dffab309e4a05bef322759a198f110aa88c3b402

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            3197a3a08069a2a33cea248503132dff4369efe6b83d13db61ef5be81e26f5c3f57ecba9c31e73754f321848dcf491f19eb0249f5f182c2332ae0879ed84b56c

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\qbtauu.exe

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            30KB

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            d8a05fae946f16dbb12d5489f2b68230

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            f8068ceb85905539ed39dc4dc187088487b09e17

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            7876b3d0721a40d4d80f873be9ff79e722e28bd24ba0ee9ab9faac5c7aa69899

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            661fc778e40c260756d928fe3bed91c3cbc8884ac27a071e1bf3c8f97c9133bd4bd853371baed477a3988305c12e1c405d03059f8652d810a23eb6050f6ade77

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\uvplms.exe

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            161KB

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            760aa2ef40d31c55f0019cc916e9de48

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            0228e46ca0a0303bebf54a65bf5da8111c4de402

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            7ae58db4879d8daf291c5eab58ca9b49bc1b5c63153a02d175d83406a71a2806

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            ce85a4af522b22d696ff98e176e2f97280363ac5e4161e39dac8cb0404af8d20fc4efe0ddd9e39cfa07bef28b65960c9a56822c6436b715f37ec6df9bd512d04

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\wjthpw.exe

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            152KB

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            c0a4054bc0a6553d3a246d91e6cdc95b

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            b8722a0cf5483539ce965098fb299ad129d1a36b

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            0c20402e4957de72ae5e6c5ce00d0dfab6a49affb260996b3290d44264977909

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            5f5e88e876e6363992cd28794203874d27fc204bc7df004d32bfa18ebd0797c8c89ccb6b4cc44d4bdf6a9b476d5be5bec2a91bdc7020ba7b3628b98c9587ea5e

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\wqxlvz.exe

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            161KB

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            a2e166ef9ba63b78150b9e08767d0764

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            885c223c8436ee6184f6335f3bcf7bd761e85319

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            0626693b0820897af0b56b9092439ce955a2435b610127d1686ea256eddc230f

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            04651a2f9f4d648b95e7a5e67a1e1ddbaa12d8d2d1fecbf2da956b58826ad2f0aee2b1e182b1beab3f73215185f7c402df67fed4e0bcf401a2eea64ec34c627b

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\15415145.exe

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            59KB

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            6c091ad6fae0fa76f44870d1a1b05cb4

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            040f60c0ee3f4902f919025057e34ab4d11b1abd

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

                                                                                                                                                                                                                                                                                                          • memory/216-1642-0x0000000000BF0000-0x0000000000C1E000-memory.dmp

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            184KB

                                                                                                                                                                                                                                                                                                          • memory/1188-714-0x0000000000330000-0x000000000035C000-memory.dmp

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            176KB

                                                                                                                                                                                                                                                                                                          • memory/1248-0-0x00007FFD18D73000-0x00007FFD18D75000-memory.dmp

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                                                          • memory/1248-12-0x00007FFD18D70000-0x00007FFD19831000-memory.dmp

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            10.8MB

                                                                                                                                                                                                                                                                                                          • memory/1248-10-0x00007FFD18D70000-0x00007FFD19831000-memory.dmp

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            10.8MB

                                                                                                                                                                                                                                                                                                          • memory/1248-11-0x00007FFD18D73000-0x00007FFD18D75000-memory.dmp

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                                                          • memory/1248-1-0x0000000000B20000-0x0000000000B36000-memory.dmp

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            88KB

                                                                                                                                                                                                                                                                                                          • memory/2204-1422-0x0000000000220000-0x000000000024E000-memory.dmp

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            184KB

                                                                                                                                                                                                                                                                                                          • memory/2324-17-0x00007FFD18D70000-0x00007FFD19831000-memory.dmp

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            10.8MB

                                                                                                                                                                                                                                                                                                          • memory/2324-15-0x00007FFD18D70000-0x00007FFD19831000-memory.dmp

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            10.8MB

                                                                                                                                                                                                                                                                                                          • memory/2420-1233-0x0000000000B40000-0x0000000000B6E000-memory.dmp

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            184KB

                                                                                                                                                                                                                                                                                                          • memory/3600-409-0x0000000000540000-0x000000000056E000-memory.dmp

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            184KB

                                                                                                                                                                                                                                                                                                          • memory/3628-30-0x00000000006C0000-0x00000000006CE000-memory.dmp

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            56KB

                                                                                                                                                                                                                                                                                                          • memory/4028-33-0x000001F46BBB0000-0x000001F46BBD2000-memory.dmp

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            136KB

                                                                                                                                                                                                                                                                                                          • memory/4488-220-0x0000000000280000-0x00000000002AE000-memory.dmp

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            184KB

                                                                                                                                                                                                                                                                                                          • memory/4504-330-0x0000000000670000-0x00000000006A0000-memory.dmp

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            192KB

                                                                                                                                                                                                                                                                                                          • memory/4536-473-0x0000000000560000-0x000000000058C000-memory.dmp

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            176KB

                                                                                                                                                                                                                                                                                                          • memory/4768-571-0x00000000006C0000-0x00000000006CE000-memory.dmp

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            56KB