Analysis

  • max time kernel
    900s
  • max time network
    901s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250217-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    06/03/2025, 18:07

General

  • Target

    15415145.exe

  • Size

    59KB

  • MD5

    6c091ad6fae0fa76f44870d1a1b05cb4

  • SHA1

    040f60c0ee3f4902f919025057e34ab4d11b1abd

  • SHA256

    c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

  • SHA512

    3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

  • SSDEEP

    1536:skyZtyUQ8sBkROLW+UzbTH3gfm2qt0OgSko7:skItfQ8sBkROUzbTQf+6OgK7

Malware Config

Extracted

Family

xworm

Version

3.1

C2

known-savage.gl.at.ply.gg:45116

association-lectures.gl.at.ply.gg:32463

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain
aes.plain

Signatures

  • Detect Xworm Payload 22 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 9 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 18 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 9 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\15415145.exe
    "C:\Users\Admin\AppData\Local\Temp\15415145.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:556
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "15415145" /tr "C:\Users\Admin\AppData\Roaming\15415145.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:4108
    • C:\Users\Admin\AppData\Local\Temp\xmvoaj.exe
      "C:\Users\Admin\AppData\Local\Temp\xmvoaj.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3176
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\xmvoaj.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4132
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'xmvoaj.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4240
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\xmvoaj.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2860
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "xmvoaj" /tr "C:\Users\Admin\AppData\Roaming\xmvoaj.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4888
      • C:\Users\Admin\AppData\Local\Temp\kavrpf.exe
        "C:\Users\Admin\AppData\Local\Temp\kavrpf.exe"
        3⤵
        • Executes dropped EXE
        PID:1704
      • C:\Users\Admin\AppData\Local\Temp\apfujw.exe
        "C:\Users\Admin\AppData\Local\Temp\apfujw.exe"
        3⤵
        • Executes dropped EXE
        PID:824
      • C:\Users\Admin\AppData\Local\Temp\soqwcj.exe
        "C:\Users\Admin\AppData\Local\Temp\soqwcj.exe"
        3⤵
        • Executes dropped EXE
        PID:2336
      • C:\Users\Admin\AppData\Local\Temp\ccjcxl.exe
        "C:\Users\Admin\AppData\Local\Temp\ccjcxl.exe"
        3⤵
        • Executes dropped EXE
        PID:4632
    • C:\Users\Admin\AppData\Local\Temp\wcbjtm.exe
      "C:\Users\Admin\AppData\Local\Temp\wcbjtm.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3272
    • C:\Users\Admin\AppData\Local\Temp\ubqofo.exe
      "C:\Users\Admin\AppData\Local\Temp\ubqofo.exe"
      2⤵
      • Executes dropped EXE
      PID:2624
    • C:\Users\Admin\AppData\Local\Temp\jjzjgy.exe
      "C:\Users\Admin\AppData\Local\Temp\jjzjgy.exe"
      2⤵
      • Executes dropped EXE
      PID:4152
    • C:\Users\Admin\AppData\Local\Temp\tpmwoh.exe
      "C:\Users\Admin\AppData\Local\Temp\tpmwoh.exe"
      2⤵
      • Executes dropped EXE
      PID:3052
    • C:\Users\Admin\AppData\Local\Temp\ebenjl.exe
      "C:\Users\Admin\AppData\Local\Temp\ebenjl.exe"
      2⤵
      • Executes dropped EXE
      PID:4216
    • C:\Users\Admin\AppData\Local\Temp\xxflxc.exe
      "C:\Users\Admin\AppData\Local\Temp\xxflxc.exe"
      2⤵
      • Executes dropped EXE
      PID:4052
    • C:\Users\Admin\AppData\Local\Temp\fvumuw.exe
      "C:\Users\Admin\AppData\Local\Temp\fvumuw.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:1164
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "fvumuw" /tr "C:\Users\Admin\AppData\Roaming\fvumuw.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1292
      • C:\Users\Admin\AppData\Local\Temp\kvtrzc.exe
        "C:\Users\Admin\AppData\Local\Temp\kvtrzc.exe"
        3⤵
        • Executes dropped EXE
        PID:900
      • C:\Users\Admin\AppData\Local\Temp\gbdoon.exe
        "C:\Users\Admin\AppData\Local\Temp\gbdoon.exe"
        3⤵
        • Executes dropped EXE
        PID:4520
      • C:\Users\Admin\AppData\Local\Temp\hwnyji.exe
        "C:\Users\Admin\AppData\Local\Temp\hwnyji.exe"
        3⤵
        • Executes dropped EXE
        PID:5108
      • C:\Users\Admin\AppData\Local\Temp\yheguc.exe
        "C:\Users\Admin\AppData\Local\Temp\yheguc.exe"
        3⤵
        • Checks computer location settings
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2300
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "yheguc" /tr "C:\Users\Admin\AppData\Roaming\yheguc.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1144
        • C:\Users\Admin\AppData\Local\Temp\nxgbse.exe
          "C:\Users\Admin\AppData\Local\Temp\nxgbse.exe"
          4⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          PID:1804
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "nxgbse" /tr "C:\Users\Admin\AppData\Roaming\nxgbse.exe"
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:3808
          • C:\Users\Admin\AppData\Local\Temp\uempfc.exe
            "C:\Users\Admin\AppData\Local\Temp\uempfc.exe"
            5⤵
            • Executes dropped EXE
            PID:5056
          • C:\Users\Admin\AppData\Local\Temp\ifvjea.exe
            "C:\Users\Admin\AppData\Local\Temp\ifvjea.exe"
            5⤵
            • Executes dropped EXE
            PID:1772
          • C:\Users\Admin\AppData\Local\Temp\onhxme.exe
            "C:\Users\Admin\AppData\Local\Temp\onhxme.exe"
            5⤵
              PID:2660
            • C:\Users\Admin\AppData\Local\Temp\blipjh.exe
              "C:\Users\Admin\AppData\Local\Temp\blipjh.exe"
              5⤵
                PID:5056
              • C:\Users\Admin\AppData\Local\Temp\zmijzw.exe
                "C:\Users\Admin\AppData\Local\Temp\zmijzw.exe"
                5⤵
                  PID:4020
                • C:\Users\Admin\AppData\Local\Temp\eecyap.exe
                  "C:\Users\Admin\AppData\Local\Temp\eecyap.exe"
                  5⤵
                    PID:5068
                  • C:\Users\Admin\AppData\Local\Temp\ossyqx.exe
                    "C:\Users\Admin\AppData\Local\Temp\ossyqx.exe"
                    5⤵
                      PID:2784
                    • C:\Users\Admin\AppData\Local\Temp\lzuzkt.exe
                      "C:\Users\Admin\AppData\Local\Temp\lzuzkt.exe"
                      5⤵
                        PID:3076
                      • C:\Users\Admin\AppData\Local\Temp\ziupdr.exe
                        "C:\Users\Admin\AppData\Local\Temp\ziupdr.exe"
                        5⤵
                          PID:3876
                        • C:\Users\Admin\AppData\Local\Temp\xeueqt.exe
                          "C:\Users\Admin\AppData\Local\Temp\xeueqt.exe"
                          5⤵
                            PID:4248
                          • C:\Users\Admin\AppData\Local\Temp\uzgzfa.exe
                            "C:\Users\Admin\AppData\Local\Temp\uzgzfa.exe"
                            5⤵
                              PID:1456
                            • C:\Users\Admin\AppData\Local\Temp\xqmsjt.exe
                              "C:\Users\Admin\AppData\Local\Temp\xqmsjt.exe"
                              5⤵
                                PID:2076
                              • C:\Users\Admin\AppData\Local\Temp\lcukek.exe
                                "C:\Users\Admin\AppData\Local\Temp\lcukek.exe"
                                5⤵
                                  PID:4084
                                • C:\Users\Admin\AppData\Local\Temp\nzbpjr.exe
                                  "C:\Users\Admin\AppData\Local\Temp\nzbpjr.exe"
                                  5⤵
                                    PID:4364
                                  • C:\Users\Admin\AppData\Local\Temp\boalbw.exe
                                    "C:\Users\Admin\AppData\Local\Temp\boalbw.exe"
                                    5⤵
                                    • Checks computer location settings
                                    • Drops startup file
                                    • Adds Run key to start application
                                    PID:4196
                                    • C:\Windows\System32\schtasks.exe
                                      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "boalbw" /tr "C:\Users\Admin\AppData\Roaming\boalbw.exe"
                                      6⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:3444
                                    • C:\Users\Admin\AppData\Local\Temp\uubebv.exe
                                      "C:\Users\Admin\AppData\Local\Temp\uubebv.exe"
                                      6⤵
                                      • Checks computer location settings
                                      • Drops startup file
                                      • Adds Run key to start application
                                      PID:756
                                      • C:\Windows\System32\schtasks.exe
                                        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "uubebv" /tr "C:\Users\Admin\AppData\Roaming\uubebv.exe"
                                        7⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:4516
                                      • C:\Users\Admin\AppData\Local\Temp\abaqzv.exe
                                        "C:\Users\Admin\AppData\Local\Temp\abaqzv.exe"
                                        7⤵
                                          PID:3352
                                      • C:\Users\Admin\AppData\Local\Temp\vgiegg.exe
                                        "C:\Users\Admin\AppData\Local\Temp\vgiegg.exe"
                                        6⤵
                                          PID:3800
                                        • C:\Users\Admin\AppData\Local\Temp\ioitaa.exe
                                          "C:\Users\Admin\AppData\Local\Temp\ioitaa.exe"
                                          6⤵
                                            PID:4020
                                          • C:\Users\Admin\AppData\Local\Temp\zqosmo.exe
                                            "C:\Users\Admin\AppData\Local\Temp\zqosmo.exe"
                                            6⤵
                                              PID:1968
                                          • C:\Users\Admin\AppData\Local\Temp\ujczeq.exe
                                            "C:\Users\Admin\AppData\Local\Temp\ujczeq.exe"
                                            5⤵
                                              PID:1652
                                            • C:\Users\Admin\AppData\Local\Temp\rlttcu.exe
                                              "C:\Users\Admin\AppData\Local\Temp\rlttcu.exe"
                                              5⤵
                                                PID:1472
                                              • C:\Users\Admin\AppData\Local\Temp\ggzada.exe
                                                "C:\Users\Admin\AppData\Local\Temp\ggzada.exe"
                                                5⤵
                                                  PID:1772
                                                • C:\Users\Admin\AppData\Local\Temp\wmakrq.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\wmakrq.exe"
                                                  5⤵
                                                    PID:384
                                                  • C:\Users\Admin\AppData\Local\Temp\rfppxr.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\rfppxr.exe"
                                                    5⤵
                                                      PID:3108
                                                    • C:\Users\Admin\AppData\Local\Temp\zmpqxa.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\zmpqxa.exe"
                                                      5⤵
                                                        PID:5076
                                                    • C:\Users\Admin\AppData\Local\Temp\qjtvwu.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\qjtvwu.exe"
                                                      4⤵
                                                      • Executes dropped EXE
                                                      PID:392
                                                    • C:\Users\Admin\AppData\Local\Temp\fcijyt.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\fcijyt.exe"
                                                      4⤵
                                                      • Executes dropped EXE
                                                      PID:3956
                                                    • C:\Users\Admin\AppData\Local\Temp\gjgodh.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\gjgodh.exe"
                                                      4⤵
                                                      • Executes dropped EXE
                                                      PID:1124
                                                    • C:\Users\Admin\AppData\Local\Temp\prcdxx.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\prcdxx.exe"
                                                      4⤵
                                                        PID:4672
                                                      • C:\Users\Admin\AppData\Local\Temp\pkugrz.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\pkugrz.exe"
                                                        4⤵
                                                          PID:4360
                                                        • C:\Users\Admin\AppData\Local\Temp\fhqxrt.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\fhqxrt.exe"
                                                          4⤵
                                                            PID:4604
                                                          • C:\Users\Admin\AppData\Local\Temp\kallxz.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\kallxz.exe"
                                                            4⤵
                                                              PID:4976
                                                            • C:\Users\Admin\AppData\Local\Temp\rkjpbc.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\rkjpbc.exe"
                                                              4⤵
                                                                PID:3668
                                                              • C:\Users\Admin\AppData\Local\Temp\qyuyla.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\qyuyla.exe"
                                                                4⤵
                                                                  PID:328
                                                                • C:\Users\Admin\AppData\Local\Temp\bnmwfm.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\bnmwfm.exe"
                                                                  4⤵
                                                                    PID:3280
                                                                  • C:\Users\Admin\AppData\Local\Temp\azkjer.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\azkjer.exe"
                                                                    4⤵
                                                                      PID:1192
                                                                    • C:\Users\Admin\AppData\Local\Temp\djrmed.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\djrmed.exe"
                                                                      4⤵
                                                                        PID:2776
                                                                      • C:\Users\Admin\AppData\Local\Temp\wetdlm.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\wetdlm.exe"
                                                                        4⤵
                                                                          PID:3584
                                                                        • C:\Users\Admin\AppData\Local\Temp\oairpt.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\oairpt.exe"
                                                                          4⤵
                                                                            PID:4080
                                                                          • C:\Users\Admin\AppData\Local\Temp\fgvpve.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\fgvpve.exe"
                                                                            4⤵
                                                                              PID:1256
                                                                            • C:\Users\Admin\AppData\Local\Temp\houyky.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\houyky.exe"
                                                                              4⤵
                                                                                PID:632
                                                                              • C:\Users\Admin\AppData\Local\Temp\oigrls.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\oigrls.exe"
                                                                                4⤵
                                                                                  PID:332
                                                                                • C:\Users\Admin\AppData\Local\Temp\kdurbh.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\kdurbh.exe"
                                                                                  4⤵
                                                                                    PID:3236
                                                                                  • C:\Users\Admin\AppData\Local\Temp\hxbahe.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\hxbahe.exe"
                                                                                    4⤵
                                                                                      PID:628
                                                                                    • C:\Users\Admin\AppData\Local\Temp\eijrdx.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\eijrdx.exe"
                                                                                      4⤵
                                                                                        PID:3344
                                                                                      • C:\Users\Admin\AppData\Local\Temp\vonnfp.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\vonnfp.exe"
                                                                                        4⤵
                                                                                          PID:2184
                                                                                        • C:\Users\Admin\AppData\Local\Temp\iyuvpc.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\iyuvpc.exe"
                                                                                          4⤵
                                                                                            PID:4112
                                                                                        • C:\Users\Admin\AppData\Local\Temp\irxvek.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\irxvek.exe"
                                                                                          3⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:3824
                                                                                        • C:\Users\Admin\AppData\Local\Temp\wrhrjh.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\wrhrjh.exe"
                                                                                          3⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:1528
                                                                                        • C:\Users\Admin\AppData\Local\Temp\occpnf.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\occpnf.exe"
                                                                                          3⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:4332
                                                                                        • C:\Users\Admin\AppData\Local\Temp\zpxskr.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\zpxskr.exe"
                                                                                          3⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:2068
                                                                                        • C:\Users\Admin\AppData\Local\Temp\zvvjyn.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\zvvjyn.exe"
                                                                                          3⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:2308
                                                                                        • C:\Users\Admin\AppData\Local\Temp\weaqji.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\weaqji.exe"
                                                                                          3⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:4716
                                                                                        • C:\Users\Admin\AppData\Local\Temp\flxssx.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\flxssx.exe"
                                                                                          3⤵
                                                                                            PID:3680
                                                                                          • C:\Users\Admin\AppData\Local\Temp\gqnfjh.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\gqnfjh.exe"
                                                                                            3⤵
                                                                                              PID:2708
                                                                                            • C:\Users\Admin\AppData\Local\Temp\fjuygf.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\fjuygf.exe"
                                                                                              3⤵
                                                                                                PID:3824
                                                                                              • C:\Users\Admin\AppData\Local\Temp\fpggvi.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\fpggvi.exe"
                                                                                                3⤵
                                                                                                  PID:800
                                                                                                • C:\Users\Admin\AppData\Local\Temp\pmstvf.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\pmstvf.exe"
                                                                                                  3⤵
                                                                                                    PID:4584
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\gxtujc.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\gxtujc.exe"
                                                                                                    3⤵
                                                                                                      PID:4180
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\ihxamu.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\ihxamu.exe"
                                                                                                      3⤵
                                                                                                        PID:2260
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\dulodo.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\dulodo.exe"
                                                                                                        3⤵
                                                                                                          PID:1832
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\sxxvlt.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\sxxvlt.exe"
                                                                                                          3⤵
                                                                                                            PID:116
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\byqodf.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\byqodf.exe"
                                                                                                            3⤵
                                                                                                              PID:996
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\emviym.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\emviym.exe"
                                                                                                              3⤵
                                                                                                                PID:2776
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\olzrpz.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\olzrpz.exe"
                                                                                                                3⤵
                                                                                                                  PID:2732
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\iedmcb.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\iedmcb.exe"
                                                                                                                  3⤵
                                                                                                                    PID:1648
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\wbjeax.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\wbjeax.exe"
                                                                                                                    3⤵
                                                                                                                      PID:5048
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\illzsk.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\illzsk.exe"
                                                                                                                      3⤵
                                                                                                                        PID:2336
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\mudsvz.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\mudsvz.exe"
                                                                                                                        3⤵
                                                                                                                          PID:4956
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\zvvzzs.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\zvvzzs.exe"
                                                                                                                          3⤵
                                                                                                                            PID:3888
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\pbixnh.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\pbixnh.exe"
                                                                                                                            3⤵
                                                                                                                              PID:3236
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\rxhxxt.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\rxhxxt.exe"
                                                                                                                            2⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            PID:2052
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\gngxvk.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\gngxvk.exe"
                                                                                                                            2⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            PID:4784
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\xaotes.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\xaotes.exe"
                                                                                                                            2⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            PID:1124
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\igseqi.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\igseqi.exe"
                                                                                                                            2⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            PID:3272
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\jylxdk.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\jylxdk.exe"
                                                                                                                            2⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            PID:1852
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\egupeq.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\egupeq.exe"
                                                                                                                            2⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            PID:2340
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ahdlhv.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ahdlhv.exe"
                                                                                                                            2⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            PID:4684
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\fzbvnx.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\fzbvnx.exe"
                                                                                                                            2⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            PID:4792
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\omrben.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\omrben.exe"
                                                                                                                            2⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            PID:5044
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\emgzoz.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\emgzoz.exe"
                                                                                                                            2⤵
                                                                                                                            • Checks computer location settings
                                                                                                                            • Drops startup file
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Adds Run key to start application
                                                                                                                            PID:4780
                                                                                                                            • C:\Windows\System32\schtasks.exe
                                                                                                                              "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "emgzoz" /tr "C:\Users\Admin\AppData\Roaming\emgzoz.exe"
                                                                                                                              3⤵
                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                              PID:2056
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\usxtjc.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\usxtjc.exe"
                                                                                                                              3⤵
                                                                                                                                PID:2288
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ftqwrx.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ftqwrx.exe"
                                                                                                                                3⤵
                                                                                                                                  PID:3448
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\bxoxbf.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\bxoxbf.exe"
                                                                                                                                  3⤵
                                                                                                                                    PID:680
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\rmznsa.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\rmznsa.exe"
                                                                                                                                    3⤵
                                                                                                                                    • Checks computer location settings
                                                                                                                                    • Drops startup file
                                                                                                                                    • Adds Run key to start application
                                                                                                                                    PID:3644
                                                                                                                                    • C:\Windows\System32\schtasks.exe
                                                                                                                                      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "rmznsa" /tr "C:\Users\Admin\AppData\Roaming\rmznsa.exe"
                                                                                                                                      4⤵
                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                      PID:4392
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\ipddrm.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\ipddrm.exe"
                                                                                                                                      4⤵
                                                                                                                                        PID:4384
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\wamvei.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\wamvei.exe"
                                                                                                                                        4⤵
                                                                                                                                          PID:1580
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\vosbyg.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\vosbyg.exe"
                                                                                                                                          4⤵
                                                                                                                                            PID:4984
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\jdxeiu.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\jdxeiu.exe"
                                                                                                                                            4⤵
                                                                                                                                              PID:2704
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\pavync.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\pavync.exe"
                                                                                                                                              4⤵
                                                                                                                                                PID:2216
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\szisdq.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\szisdq.exe"
                                                                                                                                                4⤵
                                                                                                                                                  PID:716
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ugopiy.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ugopiy.exe"
                                                                                                                                                  4⤵
                                                                                                                                                    PID:872
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\sarlnm.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\sarlnm.exe"
                                                                                                                                                    4⤵
                                                                                                                                                      PID:1344
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\zfbpks.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\zfbpks.exe"
                                                                                                                                                      4⤵
                                                                                                                                                        PID:1556
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\fehioq.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\fehioq.exe"
                                                                                                                                                        4⤵
                                                                                                                                                          PID:4132
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\qxmkcf.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\qxmkcf.exe"
                                                                                                                                                          4⤵
                                                                                                                                                            PID:1988
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ackbgr.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ackbgr.exe"
                                                                                                                                                            4⤵
                                                                                                                                                              PID:652
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\suvymh.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\suvymh.exe"
                                                                                                                                                              4⤵
                                                                                                                                                                PID:2784
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\fgxjab.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\fgxjab.exe"
                                                                                                                                                              3⤵
                                                                                                                                                                PID:1412
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\obvcuh.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\obvcuh.exe"
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:2296
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\bkthzn.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\bkthzn.exe"
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:4304
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ethhwn.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\ethhwn.exe"
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:4152
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\lionss.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\lionss.exe"
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:4084
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\agawnc.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\agawnc.exe"
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:4372
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ewsphp.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\ewsphp.exe"
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:3980
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\czchvr.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\czchvr.exe"
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:3672
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ljmmjy.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\ljmmjy.exe"
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:4564
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tykkxs.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\tykkxs.exe"
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:344
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\majcbn.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\majcbn.exe"
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:3672
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\hfwrcd.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\hfwrcd.exe"
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:1532
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\uplrfw.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\uplrfw.exe"
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:4372
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\lemxcj.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\lemxcj.exe"
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:3096
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\fnxbcp.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\fnxbcp.exe"
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:3444
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ijjvto.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\ijjvto.exe"
                                                                                                                                                                                          2⤵
                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                          PID:3836
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\pivxtx.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\pivxtx.exe"
                                                                                                                                                                                          2⤵
                                                                                                                                                                                            PID:2868
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\oxzwzr.exe
                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\oxzwzr.exe"
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:4388
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\gnlnir.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\gnlnir.exe"
                                                                                                                                                                                              2⤵
                                                                                                                                                                                                PID:396
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tcchlr.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\tcchlr.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                  PID:4592
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\katecy.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\katecy.exe"
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                    PID:2220
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ljgnff.exe
                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\ljgnff.exe"
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                      PID:4676
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\cqsunh.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\cqsunh.exe"
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                        PID:4144
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nhnpta.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\nhnpta.exe"
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                          PID:824
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\nuarcr.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\nuarcr.exe"
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                            PID:3428
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\liwent.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\liwent.exe"
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                              PID:392
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\dkubkq.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\dkubkq.exe"
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                PID:4728
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ksiglr.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ksiglr.exe"
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                  PID:4664
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\zzpvtd.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\zzpvtd.exe"
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                    PID:1188
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\eugtri.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\eugtri.exe"
                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                      PID:1928
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\xtgpcw.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\xtgpcw.exe"
                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                        PID:4816
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\ixdzqd.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\ixdzqd.exe"
                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                          PID:1764
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\mmxwfb.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\mmxwfb.exe"
                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                            PID:4716
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\rhjisd.exe
                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\rhjisd.exe"
                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                              PID:448
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\bpotzs.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\bpotzs.exe"
                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                PID:2308
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                              PID:2068
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              PID:3100
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\xmvoaj.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\xmvoaj.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              PID:4236
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\xmvoaj.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\xmvoaj.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              PID:2308
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              PID:2724
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\xmvoaj.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\xmvoaj.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              PID:4620
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              PID:1628
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\xmvoaj.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\xmvoaj.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              PID:4728
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              PID:4440
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\xmvoaj.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\xmvoaj.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              PID:4332
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              PID:4428
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\xmvoaj.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\xmvoaj.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              PID:4728
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              PID:3304
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\fvumuw.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\fvumuw.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              PID:864
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\xmvoaj.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\xmvoaj.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              PID:1840
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\fvumuw.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\fvumuw.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              PID:116
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              PID:328
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\yheguc.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\yheguc.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              PID:628
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\xmvoaj.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\xmvoaj.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              PID:4296
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\yheguc.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\yheguc.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              PID:1052
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\fvumuw.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\fvumuw.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              PID:3628
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              PID:1412
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\nxgbse.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\nxgbse.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              PID:2460
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\xmvoaj.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\xmvoaj.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              PID:236
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\yheguc.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\yheguc.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              PID:2068
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\fvumuw.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\fvumuw.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                PID:1872
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                  PID:1276
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\nxgbse.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\nxgbse.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                    PID:4900
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\emgzoz.exe
                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\emgzoz.exe"
                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                      PID:4296
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\xmvoaj.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\xmvoaj.exe"
                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                        PID:4048
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\yheguc.exe
                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\yheguc.exe"
                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                          PID:2320
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\fvumuw.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\fvumuw.exe"
                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                            PID:1636
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\emgzoz.exe
                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\emgzoz.exe"
                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                              PID:2216
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                PID:2436
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\nxgbse.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\nxgbse.exe"
                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                  PID:2224
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\xmvoaj.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\xmvoaj.exe"
                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                    PID:1264
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\yheguc.exe
                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\yheguc.exe"
                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                      PID:1536
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\fvumuw.exe
                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\fvumuw.exe"
                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                        PID:2460
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\emgzoz.exe
                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\emgzoz.exe"
                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                          PID:3284
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                            PID:2984
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\nxgbse.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\nxgbse.exe"
                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                              PID:3248
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\rmznsa.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\rmznsa.exe"
                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                PID:3332
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\xmvoaj.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\xmvoaj.exe"
                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                  PID:4584
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\yheguc.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\yheguc.exe"
                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                    PID:1452
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\fvumuw.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\fvumuw.exe"
                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                      PID:4784
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\rmznsa.exe
                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\rmznsa.exe"
                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                        PID:1536
                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\emgzoz.exe
                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\emgzoz.exe"
                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                          PID:4720
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                            PID:3956
                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\nxgbse.exe
                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\nxgbse.exe"
                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                              PID:5048
                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\xmvoaj.exe
                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\xmvoaj.exe"
                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                PID:3712
                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\yheguc.exe
                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\yheguc.exe"
                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                  PID:3316
                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\fvumuw.exe
                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\fvumuw.exe"
                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                    PID:4140
                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\rmznsa.exe
                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\rmznsa.exe"
                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                      PID:3112
                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\emgzoz.exe
                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\emgzoz.exe"
                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                        PID:1148
                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                          PID:3428
                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\nxgbse.exe
                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\nxgbse.exe"
                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                            PID:5016
                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\boalbw.exe
                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\boalbw.exe"
                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                              PID:3888
                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\xmvoaj.exe
                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\xmvoaj.exe"
                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                PID:1264
                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\yheguc.exe
                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\yheguc.exe"
                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                  PID:4304
                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\fvumuw.exe
                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\fvumuw.exe"
                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                    PID:4140
                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\rmznsa.exe
                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\rmznsa.exe"
                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                      PID:356
                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\emgzoz.exe
                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\emgzoz.exe"
                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                        PID:3664
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\15415145.exe"
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                          PID:3788
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\boalbw.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\boalbw.exe"
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                            PID:2800
                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\nxgbse.exe
                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\nxgbse.exe"
                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                              PID:1484
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\uubebv.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\uubebv.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                PID:4640

                                                                                                                                                                                                                                                                                                              Network

                                                                                                                                                                                                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                              Replay Monitor

                                                                                                                                                                                                                                                                                                              Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                              Downloads

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\15415145.exe.log

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                654B

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                11c6e74f0561678d2cf7fc075a6cc00c

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                535ee79ba978554abcb98c566235805e7ea18490

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                d39a78fabca39532fcb85ce908781a75132e1bd01cc50a3b290dd87127837d63

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                32c63d67bf512b42e7f57f71287b354200126cb417ef9d869c72e0b9388a7c2f5e3b61f303f1353baa1bf482d0f17e06e23c9f50b2f1babd4d958b6da19c40b0

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                3KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                3eb3833f769dd890afc295b977eab4b4

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                e857649b037939602c72ad003e5d3698695f436f

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                c67441dfa09f61bca500bb43407c56b8

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                5a56cf7cbeb48c109e2128c31b681fac3959157b

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                63082da456c124d0bc516d2161d1613db5f3008d903e4066d2c7b4e90b435f33

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                325de8b718b3a01df05e20e028c5882240e5fd2e96c771361b776312923ff178f27494a1f5249bf6d7365a99155eb8735a51366e85597008e6a10462e63ee0e8

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                7042051318ea057f67f377da796744bc

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                d474fe023ab765861b4ccaf7e8c1aca65d101360

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                3e3b6c418aa35efdcae9bf4349543b26cefa3ba00d1acc163296007dc99c5a10

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                bb2cc212affe3424489126574fd25d65b18eece069ae75cc547776d0c81e46741fcab016be6f4ae5ac7a3d7e34ce9dd4f9dbecabb2790412dfba42065df93905

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_uk2x2kah.kx5.ps1

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                60B

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\abaqzv.exe

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                159KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                c73cfd1942fdfaf5d6f3940ca42bbadd

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                9c9424953c85d03daf296d7841577228d15e1884

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                3d735b082f087b25561d293d17a6cda64326f3d48c1db53a2941ded1afc78773

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                9d7ce397b67e704773f7a9ea6c9cd1e5345f2211a67ac5dd5f622118690ed295a18e763c47e5c208240f71d4bedb67ba1e869faff466602f8e97350f9df9495c

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\boalbw.exe

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                161KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                a2e166ef9ba63b78150b9e08767d0764

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                885c223c8436ee6184f6335f3bcf7bd761e85319

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                0626693b0820897af0b56b9092439ce955a2435b610127d1686ea256eddc230f

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                04651a2f9f4d648b95e7a5e67a1e1ddbaa12d8d2d1fecbf2da956b58826ad2f0aee2b1e182b1beab3f73215185f7c402df67fed4e0bcf401a2eea64ec34c627b

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\emgzoz.exe

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                152KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                c0a4054bc0a6553d3a246d91e6cdc95b

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                b8722a0cf5483539ce965098fb299ad129d1a36b

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                0c20402e4957de72ae5e6c5ce00d0dfab6a49affb260996b3290d44264977909

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                5f5e88e876e6363992cd28794203874d27fc204bc7df004d32bfa18ebd0797c8c89ccb6b4cc44d4bdf6a9b476d5be5bec2a91bdc7020ba7b3628b98c9587ea5e

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\fvumuw.exe

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                159KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                49a6b6e8627762b929999b0b1fe6d604

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                4a47bbb17c6cbda79794428df97d203b7261af79

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                ca6aa52d419303376de2c37b4c8f6bdd41e31e55de6d178520ad5056303b6571

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                c967dcb9be6b1fa73f1ef50a7785c17919365857be63923c6cad53362931d9a1c9fb41a43d68a050ad2a50239580fc8294e61e2ba10ee19d185f4f91c035b85b

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\nxgbse.exe

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                156KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                e2cf7cb958bda8d948e80bdb78d6e283

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                34c18cf619966914046b7a8f9070b0ee9ca0523d

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                07f878b812dc294a61fb6030dffab309e4a05bef322759a198f110aa88c3b402

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                3197a3a08069a2a33cea248503132dff4369efe6b83d13db61ef5be81e26f5c3f57ecba9c31e73754f321848dcf491f19eb0249f5f182c2332ae0879ed84b56c

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\rmznsa.exe

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                151KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                5cdc9671612660bd34747c635218a649

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                8cebfbdfc27689d9988d4512da7d855c13eb8e0b

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                119b3e5a0b2aad4dc9a6a7376dde77e80826830a24a08aefd858710e79a11db9

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                a33bfb9c9db6469274a38bee8038fa7a86b2e336e48776bee788b7b2b372556b5880253cdc7856339130ca8b29c199a739020e78ca29cc401f441e2ac18280ef

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\usxtjc.exe

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                30KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                d8a05fae946f16dbb12d5489f2b68230

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                f8068ceb85905539ed39dc4dc187088487b09e17

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                7876b3d0721a40d4d80f873be9ff79e722e28bd24ba0ee9ab9faac5c7aa69899

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                661fc778e40c260756d928fe3bed91c3cbc8884ac27a071e1bf3c8f97c9133bd4bd853371baed477a3988305c12e1c405d03059f8652d810a23eb6050f6ade77

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\uubebv.exe

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                161KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                760aa2ef40d31c55f0019cc916e9de48

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                0228e46ca0a0303bebf54a65bf5da8111c4de402

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                7ae58db4879d8daf291c5eab58ca9b49bc1b5c63153a02d175d83406a71a2806

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                ce85a4af522b22d696ff98e176e2f97280363ac5e4161e39dac8cb0404af8d20fc4efe0ddd9e39cfa07bef28b65960c9a56822c6436b715f37ec6df9bd512d04

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\xmvoaj.exe

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                34KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                950d739da650457fab6a225545794238

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                e965286161ecda1b8c0072d8a2d80c191bb15705

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                a571fcac5384158c4927e7c7cf07182b68eccf67845ba927beae44cd9835e3f8

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                b7b91343176c5a7f6408b21fbc96c23d0b02c080b846e29f304ba91de1d0f37a772953e7ab65d1d627cb3490fbef3b85681564e878d8dcda57c0897dbad1d19b

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\yheguc.exe

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                166KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                7a7586c1278ecdb7881a3b34f841b722

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                8c991bb42729a7e34a096f9d3b23e7e0a25329a8

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                e2e527d70759106b6d1f479d0a1edd99d9b57c7fdfde2fffd1705e2161438a7f

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                79ddd9f08587767ab6b2b66fa7873b0de9a51b8ee52abe8b9ed7e7cf9c42ddd3e45069e978bde40e1708c44a7d8c6a5c271e1dd7129501227dcd8dc5477872b2

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\15415145.exe

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                59KB

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                6c091ad6fae0fa76f44870d1a1b05cb4

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                040f60c0ee3f4902f919025057e34ab4d11b1abd

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

                                                                                                                                                                                                                                                                                                              • memory/556-11-0x00007FF9A3AB3000-0x00007FF9A3AB5000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                8KB

                                                                                                                                                                                                                                                                                                              • memory/556-1-0x0000000000360000-0x0000000000376000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                88KB

                                                                                                                                                                                                                                                                                                              • memory/556-10-0x00007FF9A3AB0000-0x00007FF9A4572000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                10.8MB

                                                                                                                                                                                                                                                                                                              • memory/556-12-0x00007FF9A3AB0000-0x00007FF9A4572000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                10.8MB

                                                                                                                                                                                                                                                                                                              • memory/556-0-0x00007FF9A3AB3000-0x00007FF9A3AB5000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                8KB

                                                                                                                                                                                                                                                                                                              • memory/756-1797-0x0000000000320000-0x000000000034E000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                184KB

                                                                                                                                                                                                                                                                                                              • memory/1164-256-0x0000000000910000-0x000000000093E000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                184KB

                                                                                                                                                                                                                                                                                                              • memory/1804-480-0x0000000000930000-0x000000000095E000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                184KB

                                                                                                                                                                                                                                                                                                              • memory/2068-15-0x00007FF9A3AB0000-0x00007FF9A4572000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                10.8MB

                                                                                                                                                                                                                                                                                                              • memory/2068-17-0x00007FF9A3AB0000-0x00007FF9A4572000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                10.8MB

                                                                                                                                                                                                                                                                                                              • memory/2288-684-0x0000000000560000-0x000000000056E000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                56KB

                                                                                                                                                                                                                                                                                                              • memory/2300-391-0x00000000004B0000-0x00000000004E0000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                192KB

                                                                                                                                                                                                                                                                                                              • memory/3176-33-0x0000000000770000-0x000000000077E000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                56KB

                                                                                                                                                                                                                                                                                                              • memory/3352-2077-0x0000000000120000-0x000000000014E000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                184KB

                                                                                                                                                                                                                                                                                                              • memory/3644-878-0x0000000000800000-0x000000000082C000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                176KB

                                                                                                                                                                                                                                                                                                              • memory/4132-36-0x0000021073810000-0x0000021073832000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                136KB

                                                                                                                                                                                                                                                                                                              • memory/4196-1553-0x0000000000DC0000-0x0000000000DEE000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                184KB

                                                                                                                                                                                                                                                                                                              • memory/4780-569-0x00000000003E0000-0x000000000040C000-memory.dmp

                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                176KB