Analysis

  • max time kernel
    899s
  • max time network
    901s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06/03/2025, 18:07

General

  • Target

    15415145.exe

  • Size

    59KB

  • MD5

    6c091ad6fae0fa76f44870d1a1b05cb4

  • SHA1

    040f60c0ee3f4902f919025057e34ab4d11b1abd

  • SHA256

    c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

  • SHA512

    3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

  • SSDEEP

    1536:skyZtyUQ8sBkROLW+UzbTH3gfm2qt0OgSko7:skItfQ8sBkROUzbTQf+6OgK7

Malware Config

Extracted

Family

xworm

Version

3.1

C2

known-savage.gl.at.ply.gg:45116

association-lectures.gl.at.ply.gg:32463

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain
aes.plain

Signatures

  • Detect Xworm Payload 22 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 18 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 9 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\15415145.exe
    "C:\Users\Admin\AppData\Local\Temp\15415145.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "15415145" /tr "C:\Users\Admin\AppData\Roaming\15415145.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:336
    • C:\Users\Admin\AppData\Local\Temp\puuhhq.exe
      "C:\Users\Admin\AppData\Local\Temp\puuhhq.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4388
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\puuhhq.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2472
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'puuhhq.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2664
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\puuhhq.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3520
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "puuhhq" /tr "C:\Users\Admin\AppData\Roaming\puuhhq.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:3780
      • C:\Users\Admin\AppData\Local\Temp\qepffa.exe
        "C:\Users\Admin\AppData\Local\Temp\qepffa.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2128
      • C:\Users\Admin\AppData\Local\Temp\mjazcb.exe
        "C:\Users\Admin\AppData\Local\Temp\mjazcb.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4552
      • C:\Users\Admin\AppData\Local\Temp\wxnpqp.exe
        "C:\Users\Admin\AppData\Local\Temp\wxnpqp.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4452
      • C:\Users\Admin\AppData\Local\Temp\lrkidw.exe
        "C:\Users\Admin\AppData\Local\Temp\lrkidw.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3916
    • C:\Users\Admin\AppData\Local\Temp\cvddxi.exe
      "C:\Users\Admin\AppData\Local\Temp\cvddxi.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3280
    • C:\Users\Admin\AppData\Local\Temp\toludt.exe
      "C:\Users\Admin\AppData\Local\Temp\toludt.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4620
    • C:\Users\Admin\AppData\Local\Temp\gslvoz.exe
      "C:\Users\Admin\AppData\Local\Temp\gslvoz.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3144
    • C:\Users\Admin\AppData\Local\Temp\cyrwer.exe
      "C:\Users\Admin\AppData\Local\Temp\cyrwer.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3004
    • C:\Users\Admin\AppData\Local\Temp\vyxyqw.exe
      "C:\Users\Admin\AppData\Local\Temp\vyxyqw.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1128
    • C:\Users\Admin\AppData\Local\Temp\wferoz.exe
      "C:\Users\Admin\AppData\Local\Temp\wferoz.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3040
    • C:\Users\Admin\AppData\Local\Temp\vulrhu.exe
      "C:\Users\Admin\AppData\Local\Temp\vulrhu.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:752
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "vulrhu" /tr "C:\Users\Admin\AppData\Roaming\vulrhu.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4268
      • C:\Users\Admin\AppData\Local\Temp\vceupa.exe
        "C:\Users\Admin\AppData\Local\Temp\vceupa.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1560
      • C:\Users\Admin\AppData\Local\Temp\qjuedy.exe
        "C:\Users\Admin\AppData\Local\Temp\qjuedy.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2124
      • C:\Users\Admin\AppData\Local\Temp\tjcayu.exe
        "C:\Users\Admin\AppData\Local\Temp\tjcayu.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2484
      • C:\Users\Admin\AppData\Local\Temp\dwicgj.exe
        "C:\Users\Admin\AppData\Local\Temp\dwicgj.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3044
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "dwicgj" /tr "C:\Users\Admin\AppData\Roaming\dwicgj.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2728
        • C:\Users\Admin\AppData\Local\Temp\nxplkr.exe
          "C:\Users\Admin\AppData\Local\Temp\nxplkr.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:4336
        • C:\Users\Admin\AppData\Local\Temp\xvircg.exe
          "C:\Users\Admin\AppData\Local\Temp\xvircg.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:4548
        • C:\Users\Admin\AppData\Local\Temp\dqqrll.exe
          "C:\Users\Admin\AppData\Local\Temp\dqqrll.exe"
          4⤵
          • Executes dropped EXE
          PID:232
        • C:\Users\Admin\AppData\Local\Temp\ndhroa.exe
          "C:\Users\Admin\AppData\Local\Temp\ndhroa.exe"
          4⤵
          • Executes dropped EXE
          PID:1680
        • C:\Users\Admin\AppData\Local\Temp\ekupay.exe
          "C:\Users\Admin\AppData\Local\Temp\ekupay.exe"
          4⤵
            PID:4860
          • C:\Users\Admin\AppData\Local\Temp\keuvpv.exe
            "C:\Users\Admin\AppData\Local\Temp\keuvpv.exe"
            4⤵
              PID:1232
            • C:\Users\Admin\AppData\Local\Temp\suzdhj.exe
              "C:\Users\Admin\AppData\Local\Temp\suzdhj.exe"
              4⤵
                PID:1556
              • C:\Users\Admin\AppData\Local\Temp\ocaryw.exe
                "C:\Users\Admin\AppData\Local\Temp\ocaryw.exe"
                4⤵
                  PID:2668
                • C:\Users\Admin\AppData\Local\Temp\mmwxra.exe
                  "C:\Users\Admin\AppData\Local\Temp\mmwxra.exe"
                  4⤵
                    PID:2092
                  • C:\Users\Admin\AppData\Local\Temp\pvjoha.exe
                    "C:\Users\Admin\AppData\Local\Temp\pvjoha.exe"
                    4⤵
                      PID:3480
                    • C:\Users\Admin\AppData\Local\Temp\xhujhx.exe
                      "C:\Users\Admin\AppData\Local\Temp\xhujhx.exe"
                      4⤵
                        PID:788
                      • C:\Users\Admin\AppData\Local\Temp\liavzq.exe
                        "C:\Users\Admin\AppData\Local\Temp\liavzq.exe"
                        4⤵
                          PID:4092
                        • C:\Users\Admin\AppData\Local\Temp\ljwydm.exe
                          "C:\Users\Admin\AppData\Local\Temp\ljwydm.exe"
                          4⤵
                            PID:4856
                          • C:\Users\Admin\AppData\Local\Temp\amlyco.exe
                            "C:\Users\Admin\AppData\Local\Temp\amlyco.exe"
                            4⤵
                              PID:4140
                            • C:\Users\Admin\AppData\Local\Temp\cmntfu.exe
                              "C:\Users\Admin\AppData\Local\Temp\cmntfu.exe"
                              4⤵
                                PID:2488
                              • C:\Users\Admin\AppData\Local\Temp\mdnyfz.exe
                                "C:\Users\Admin\AppData\Local\Temp\mdnyfz.exe"
                                4⤵
                                  PID:3012
                                • C:\Users\Admin\AppData\Local\Temp\pevcgq.exe
                                  "C:\Users\Admin\AppData\Local\Temp\pevcgq.exe"
                                  4⤵
                                    PID:4336
                                  • C:\Users\Admin\AppData\Local\Temp\vrnfmh.exe
                                    "C:\Users\Admin\AppData\Local\Temp\vrnfmh.exe"
                                    4⤵
                                      PID:392
                                    • C:\Users\Admin\AppData\Local\Temp\errwnu.exe
                                      "C:\Users\Admin\AppData\Local\Temp\errwnu.exe"
                                      4⤵
                                        PID:3936
                                      • C:\Users\Admin\AppData\Local\Temp\ozfghu.exe
                                        "C:\Users\Admin\AppData\Local\Temp\ozfghu.exe"
                                        4⤵
                                          PID:3744
                                        • C:\Users\Admin\AppData\Local\Temp\krcfjv.exe
                                          "C:\Users\Admin\AppData\Local\Temp\krcfjv.exe"
                                          4⤵
                                            PID:1064
                                          • C:\Users\Admin\AppData\Local\Temp\cnewiy.exe
                                            "C:\Users\Admin\AppData\Local\Temp\cnewiy.exe"
                                            4⤵
                                              PID:2160
                                            • C:\Users\Admin\AppData\Local\Temp\qygvcl.exe
                                              "C:\Users\Admin\AppData\Local\Temp\qygvcl.exe"
                                              4⤵
                                                PID:4732
                                            • C:\Users\Admin\AppData\Local\Temp\jhwzvv.exe
                                              "C:\Users\Admin\AppData\Local\Temp\jhwzvv.exe"
                                              3⤵
                                              • Executes dropped EXE
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4968
                                            • C:\Users\Admin\AppData\Local\Temp\ndistp.exe
                                              "C:\Users\Admin\AppData\Local\Temp\ndistp.exe"
                                              3⤵
                                              • Executes dropped EXE
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2564
                                            • C:\Users\Admin\AppData\Local\Temp\mwyegr.exe
                                              "C:\Users\Admin\AppData\Local\Temp\mwyegr.exe"
                                              3⤵
                                              • Drops startup file
                                              • Executes dropped EXE
                                              • Adds Run key to start application
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1224
                                              • C:\Windows\System32\schtasks.exe
                                                "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "mwyegr" /tr "C:\Users\Admin\AppData\Roaming\mwyegr.exe"
                                                4⤵
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:1664
                                              • C:\Users\Admin\AppData\Local\Temp\vgonvu.exe
                                                "C:\Users\Admin\AppData\Local\Temp\vgonvu.exe"
                                                4⤵
                                                • Drops startup file
                                                • Executes dropped EXE
                                                • Adds Run key to start application
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2328
                                                • C:\Windows\System32\schtasks.exe
                                                  "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "vgonvu" /tr "C:\Users\Admin\AppData\Roaming\vgonvu.exe"
                                                  5⤵
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:880
                                                • C:\Users\Admin\AppData\Local\Temp\fhipmv.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\fhipmv.exe"
                                                  5⤵
                                                    PID:1436
                                                  • C:\Users\Admin\AppData\Local\Temp\wsbkzz.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\wsbkzz.exe"
                                                    5⤵
                                                      PID:3340
                                                    • C:\Users\Admin\AppData\Local\Temp\dsckez.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\dsckez.exe"
                                                      5⤵
                                                        PID:2636
                                                      • C:\Users\Admin\AppData\Local\Temp\gwxgkl.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\gwxgkl.exe"
                                                        5⤵
                                                        • Drops startup file
                                                        • Adds Run key to start application
                                                        PID:4612
                                                        • C:\Windows\System32\schtasks.exe
                                                          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "gwxgkl" /tr "C:\Users\Admin\AppData\Roaming\gwxgkl.exe"
                                                          6⤵
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:772
                                                        • C:\Users\Admin\AppData\Local\Temp\abudxl.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\abudxl.exe"
                                                          6⤵
                                                            PID:1120
                                                          • C:\Users\Admin\AppData\Local\Temp\qzxoyk.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\qzxoyk.exe"
                                                            6⤵
                                                              PID:2156
                                                            • C:\Users\Admin\AppData\Local\Temp\pdpmsr.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\pdpmsr.exe"
                                                              6⤵
                                                                PID:5064
                                                              • C:\Users\Admin\AppData\Local\Temp\rinkcq.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\rinkcq.exe"
                                                                6⤵
                                                                  PID:1520
                                                                • C:\Users\Admin\AppData\Local\Temp\jlsbzd.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\jlsbzd.exe"
                                                                  6⤵
                                                                    PID:3380
                                                                  • C:\Users\Admin\AppData\Local\Temp\ngetdj.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\ngetdj.exe"
                                                                    6⤵
                                                                      PID:5028
                                                                    • C:\Users\Admin\AppData\Local\Temp\ewyasj.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\ewyasj.exe"
                                                                      6⤵
                                                                      • Drops startup file
                                                                      • Adds Run key to start application
                                                                      PID:248
                                                                      • C:\Windows\System32\schtasks.exe
                                                                        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "ewyasj" /tr "C:\Users\Admin\AppData\Roaming\ewyasj.exe"
                                                                        7⤵
                                                                        • Scheduled Task/Job: Scheduled Task
                                                                        PID:2036
                                                                      • C:\Users\Admin\AppData\Local\Temp\qrueru.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\qrueru.exe"
                                                                        7⤵
                                                                          PID:2732
                                                                        • C:\Users\Admin\AppData\Local\Temp\asdnru.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\asdnru.exe"
                                                                          7⤵
                                                                            PID:3836
                                                                          • C:\Users\Admin\AppData\Local\Temp\bosoro.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\bosoro.exe"
                                                                            7⤵
                                                                              PID:2896
                                                                            • C:\Users\Admin\AppData\Local\Temp\ekdzsn.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\ekdzsn.exe"
                                                                              7⤵
                                                                                PID:1392
                                                                            • C:\Users\Admin\AppData\Local\Temp\jvjdyb.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\jvjdyb.exe"
                                                                              6⤵
                                                                                PID:1340
                                                                              • C:\Users\Admin\AppData\Local\Temp\xrefoi.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\xrefoi.exe"
                                                                                6⤵
                                                                                  PID:4988
                                                                                • C:\Users\Admin\AppData\Local\Temp\vpydtm.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\vpydtm.exe"
                                                                                  6⤵
                                                                                  • Drops startup file
                                                                                  • Adds Run key to start application
                                                                                  PID:2796
                                                                                  • C:\Windows\System32\schtasks.exe
                                                                                    "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "vpydtm" /tr "C:\Users\Admin\AppData\Roaming\vpydtm.exe"
                                                                                    7⤵
                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                    PID:3456
                                                                                  • C:\Users\Admin\AppData\Local\Temp\vcjrrx.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\vcjrrx.exe"
                                                                                    7⤵
                                                                                      PID:1572
                                                                                  • C:\Users\Admin\AppData\Local\Temp\spzuar.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\spzuar.exe"
                                                                                    6⤵
                                                                                      PID:2332
                                                                                    • C:\Users\Admin\AppData\Local\Temp\gvzfiv.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\gvzfiv.exe"
                                                                                      6⤵
                                                                                        PID:1560
                                                                                      • C:\Users\Admin\AppData\Local\Temp\trpebg.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\trpebg.exe"
                                                                                        6⤵
                                                                                          PID:3248
                                                                                      • C:\Users\Admin\AppData\Local\Temp\dwdhtf.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\dwdhtf.exe"
                                                                                        5⤵
                                                                                          PID:4332
                                                                                        • C:\Users\Admin\AppData\Local\Temp\rqjtog.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\rqjtog.exe"
                                                                                          5⤵
                                                                                            PID:2660
                                                                                          • C:\Users\Admin\AppData\Local\Temp\pglgqh.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\pglgqh.exe"
                                                                                            5⤵
                                                                                              PID:2200
                                                                                            • C:\Users\Admin\AppData\Local\Temp\gxbwos.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\gxbwos.exe"
                                                                                              5⤵
                                                                                                PID:1064
                                                                                              • C:\Users\Admin\AppData\Local\Temp\wwnzdp.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\wwnzdp.exe"
                                                                                                5⤵
                                                                                                  PID:3132
                                                                                                • C:\Users\Admin\AppData\Local\Temp\zzwwlp.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\zzwwlp.exe"
                                                                                                  5⤵
                                                                                                    PID:420
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\rozwsi.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\rozwsi.exe"
                                                                                                    5⤵
                                                                                                      PID:3936
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\qkevux.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\qkevux.exe"
                                                                                                      5⤵
                                                                                                        PID:2508
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\ozfpzm.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\ozfpzm.exe"
                                                                                                        5⤵
                                                                                                          PID:3456
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\kgillw.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\kgillw.exe"
                                                                                                          5⤵
                                                                                                            PID:1760
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\rsnutp.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\rsnutp.exe"
                                                                                                            5⤵
                                                                                                              PID:3380
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ksvvpb.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\ksvvpb.exe"
                                                                                                              5⤵
                                                                                                                PID:4140
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ikfsgd.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ikfsgd.exe"
                                                                                                                5⤵
                                                                                                                  PID:3380
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\nabqkd.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\nabqkd.exe"
                                                                                                                  5⤵
                                                                                                                    PID:4236
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ylvdba.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ylvdba.exe"
                                                                                                                  4⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  PID:2748
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ksmgze.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ksmgze.exe"
                                                                                                                  4⤵
                                                                                                                    PID:3544
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ozggiw.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\ozggiw.exe"
                                                                                                                    4⤵
                                                                                                                      PID:4208
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\yeycmi.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\yeycmi.exe"
                                                                                                                      4⤵
                                                                                                                        PID:4488
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\xifluf.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\xifluf.exe"
                                                                                                                        4⤵
                                                                                                                          PID:1200
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\cgyitd.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\cgyitd.exe"
                                                                                                                          4⤵
                                                                                                                            PID:1568
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\kvdnwb.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\kvdnwb.exe"
                                                                                                                            4⤵
                                                                                                                              PID:2036
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\cdnsvo.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\cdnsvo.exe"
                                                                                                                              4⤵
                                                                                                                                PID:2908
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\hoxsoq.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\hoxsoq.exe"
                                                                                                                                4⤵
                                                                                                                                  PID:2748
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\vvymft.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\vvymft.exe"
                                                                                                                                  4⤵
                                                                                                                                    PID:740
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\uzyget.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\uzyget.exe"
                                                                                                                                    4⤵
                                                                                                                                      PID:336
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\ffgcwn.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\ffgcwn.exe"
                                                                                                                                      4⤵
                                                                                                                                        PID:4568
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\tliwzj.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\tliwzj.exe"
                                                                                                                                        4⤵
                                                                                                                                          PID:2900
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\vfmref.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\vfmref.exe"
                                                                                                                                          4⤵
                                                                                                                                            PID:1612
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ikrimx.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\ikrimx.exe"
                                                                                                                                            4⤵
                                                                                                                                              PID:5104
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\fyqjtx.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\fyqjtx.exe"
                                                                                                                                              4⤵
                                                                                                                                                PID:4676
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\dvzump.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\dvzump.exe"
                                                                                                                                                4⤵
                                                                                                                                                  PID:1212
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ifskzd.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ifskzd.exe"
                                                                                                                                                  4⤵
                                                                                                                                                    PID:4336
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\hywprz.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\hywprz.exe"
                                                                                                                                                    4⤵
                                                                                                                                                      PID:740
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\llyvyz.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\llyvyz.exe"
                                                                                                                                                    3⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                    PID:200
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\fwuksb.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\fwuksb.exe"
                                                                                                                                                    3⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    PID:132
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\rswvli.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\rswvli.exe"
                                                                                                                                                    3⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    PID:4824
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\droyrz.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\droyrz.exe"
                                                                                                                                                    3⤵
                                                                                                                                                      PID:4092
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\papmob.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\papmob.exe"
                                                                                                                                                      3⤵
                                                                                                                                                        PID:132
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\vzqqru.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\vzqqru.exe"
                                                                                                                                                        3⤵
                                                                                                                                                          PID:4340
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\kniwuz.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\kniwuz.exe"
                                                                                                                                                          3⤵
                                                                                                                                                            PID:4520
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\bclhbb.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\bclhbb.exe"
                                                                                                                                                            3⤵
                                                                                                                                                              PID:4744
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\tqkqap.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\tqkqap.exe"
                                                                                                                                                              3⤵
                                                                                                                                                                PID:4588
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\dmuzgy.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\dmuzgy.exe"
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:1736
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\kshsps.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\kshsps.exe"
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:2472
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\labbly.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\labbly.exe"
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:3120
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\zgwpxo.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\zgwpxo.exe"
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:1364
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nhzotx.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\nhzotx.exe"
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:1796
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\reyane.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\reyane.exe"
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:1500
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\zlhkmb.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\zlhkmb.exe"
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:2636
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\rjnswa.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\rjnswa.exe"
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:5064
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\zrfmqt.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\zrfmqt.exe"
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:2932
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\snogly.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\snogly.exe"
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:1512
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ywzkak.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\ywzkak.exe"
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:1572
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\tknwca.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\tknwca.exe"
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:1644
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\hlhxrf.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\hlhxrf.exe"
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                      PID:2488
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\etgufj.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\etgufj.exe"
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                      PID:4240
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\zgrmhy.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\zgrmhy.exe"
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                      PID:3596
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\lvxpyy.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\lvxpyy.exe"
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                      PID:4320
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\ooelzt.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\ooelzt.exe"
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                      PID:4224
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\okqwps.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\okqwps.exe"
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                      PID:4600
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\kygsuw.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\kygsuw.exe"
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                      PID:2676
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\pbavri.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\pbavri.exe"
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                      PID:3704
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\ijmmgm.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\ijmmgm.exe"
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                      PID:1952
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\wsnjic.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\wsnjic.exe"
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      PID:4764
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\asumgu.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\asumgu.exe"
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      PID:3896
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\sdqycj.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\sdqycj.exe"
                                                                                                                                                                                      2⤵
                                                                                                                                                                                        PID:2676
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\stabzw.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\stabzw.exe"
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:4080
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\xtxwdp.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\xtxwdp.exe"
                                                                                                                                                                                          2⤵
                                                                                                                                                                                            PID:740
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\hbedax.exe
                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\hbedax.exe"
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:2748
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\fbqerb.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\fbqerb.exe"
                                                                                                                                                                                              2⤵
                                                                                                                                                                                                PID:1520
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ccufco.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ccufco.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                  PID:2080
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\rjhdun.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\rjhdun.exe"
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                    PID:936
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\lvsqlo.exe
                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\lvsqlo.exe"
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                      PID:4760
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\fepefe.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\fepefe.exe"
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                        PID:1208
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\qodttb.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\qodttb.exe"
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                          PID:4080
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\snbzyx.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\snbzyx.exe"
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                            PID:1672
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\crqiet.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\crqiet.exe"
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                              PID:3836
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\idhqse.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\idhqse.exe"
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                PID:416
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\eopbym.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\eopbym.exe"
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                  PID:1568
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\lxwqpo.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\lxwqpo.exe"
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                    PID:2504
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\lxqgkg.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\lxqgkg.exe"
                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                      PID:1960
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\lmwvot.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\lmwvot.exe"
                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                        PID:4720
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\xxzwwc.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\xxzwwc.exe"
                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                          PID:2544
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:2144
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:860
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:1340
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:1680
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:2532
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:3064
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:4208
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:1632
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:1644
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:2408
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:396
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:1080
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\vulrhu.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\vulrhu.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:2440
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:4112
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:1364
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\dwicgj.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\dwicgj.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:4752
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\vulrhu.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\vulrhu.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:2156
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:1040
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:2836
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\dwicgj.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\dwicgj.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:3784
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\vulrhu.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\vulrhu.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:3420
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:4540
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\mwyegr.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\mwyegr.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:2800
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        PID:2636
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\dwicgj.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\dwicgj.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        PID:428
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\vulrhu.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\vulrhu.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                          PID:4936
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                            PID:3704
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\vgonvu.exe
                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\vgonvu.exe
                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                              PID:1556
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\mwyegr.exe
                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\mwyegr.exe
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                PID:424
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                  PID:3524
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\dwicgj.exe
                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\dwicgj.exe
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                    PID:3560
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\vulrhu.exe
                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\vulrhu.exe
                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                      PID:3368
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                        PID:3064
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\vgonvu.exe
                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\vgonvu.exe
                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                          PID:392
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\mwyegr.exe
                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\mwyegr.exe
                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                            PID:3112
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                              PID:132
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\dwicgj.exe
                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\dwicgj.exe
                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                PID:4776
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                  PID:4700
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\vulrhu.exe
                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\vulrhu.exe
                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                    PID:1232
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\vgonvu.exe
                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\vgonvu.exe
                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                      PID:2892
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\gwxgkl.exe
                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\gwxgkl.exe
                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                        PID:744
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\mwyegr.exe
                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\mwyegr.exe
                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                          PID:2720
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                            PID:3524
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\dwicgj.exe
                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\dwicgj.exe
                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                              PID:1972
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\vulrhu.exe
                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\vulrhu.exe
                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                PID:1048
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                  PID:2380
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\vgonvu.exe
                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\vgonvu.exe
                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                    PID:1056
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\gwxgkl.exe
                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\gwxgkl.exe
                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                      PID:3720
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\mwyegr.exe
                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\mwyegr.exe
                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                        PID:3036
                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                          PID:5012
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\dwicgj.exe
                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\dwicgj.exe
                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                            PID:3416
                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\ewyasj.exe
                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\ewyasj.exe
                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                              PID:1064
                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\vulrhu.exe
                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\vulrhu.exe
                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                PID:396
                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                  PID:3344
                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\vgonvu.exe
                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\vgonvu.exe
                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                    PID:2660
                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\gwxgkl.exe
                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\gwxgkl.exe
                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                      PID:4368
                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\mwyegr.exe
                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\mwyegr.exe
                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                        PID:3988
                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\puuhhq.exe
                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                          PID:572
                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\dwicgj.exe
                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\dwicgj.exe
                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                            PID:4672
                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\ewyasj.exe
                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\ewyasj.exe
                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                              PID:3744
                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\vpydtm.exe
                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\vpydtm.exe
                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                PID:2040
                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\15415145.exe
                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                  PID:4880
                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\vulrhu.exe
                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\vulrhu.exe
                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                    PID:1648
                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\vgonvu.exe
                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\vgonvu.exe
                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                      PID:3368
                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\gwxgkl.exe
                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\gwxgkl.exe
                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                        PID:2940
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\mwyegr.exe
                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\mwyegr.exe
                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                          PID:1624

                                                                                                                                                                                                                                                                                                        Network

                                                                                                                                                                                                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                        Replay Monitor

                                                                                                                                                                                                                                                                                                        Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                        Downloads

                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\15415145.exe.log

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          654B

                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                          2cbbb74b7da1f720b48ed31085cbd5b8

                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                          79caa9a3ea8abe1b9c4326c3633da64a5f724964

                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                          e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3

                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                          ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9

                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          2KB

                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                          627073ee3ca9676911bee35548eff2b8

                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                          4c4b68c65e2cab9864b51167d710aa29ebdcff2e

                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                          85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                          3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          944B

                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                          1a9fa92a4f2e2ec9e244d43a6a4f8fb9

                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                          9910190edfaccece1dfcc1d92e357772f5dae8f7

                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                          0ee052d5333fd5fd86bc84856fec98e045f077a7ac8051651bf7c521b9706888

                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                          5d2361476fa22200e6f83883efe7dcb8c3fe7dae8d56e04e28a36e9ae1270c327b6aa161d92b239593da7661289d002c574446ecfd6bd19928209aae25e3ef64

                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          944B

                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                          fdc525c373a47bd5094c556ebc21a6b8

                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                          561bec30df37443aa4cbc50ad8560dcd4ec80648

                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                          709071180b44e01eb7dd46131def23e63acc1c39098d01282e751eabcee2d794

                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                          3867def5fb4472ce03a69622d60889e37747ea1edd26f6058e60468ae4df6b40e1d15dca98e92fd27fbf8291c439bf9d3cfa7dddbfb1663f455539e7ec1492ac

                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zjaww5zc.svl.ps1

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          60B

                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\dwicgj.exe

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          166KB

                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                          7a7586c1278ecdb7881a3b34f841b722

                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                          8c991bb42729a7e34a096f9d3b23e7e0a25329a8

                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                          e2e527d70759106b6d1f479d0a1edd99d9b57c7fdfde2fffd1705e2161438a7f

                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                          79ddd9f08587767ab6b2b66fa7873b0de9a51b8ee52abe8b9ed7e7cf9c42ddd3e45069e978bde40e1708c44a7d8c6a5c271e1dd7129501227dcd8dc5477872b2

                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ekdzsn.exe

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          159KB

                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                          c73cfd1942fdfaf5d6f3940ca42bbadd

                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                          9c9424953c85d03daf296d7841577228d15e1884

                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                          3d735b082f087b25561d293d17a6cda64326f3d48c1db53a2941ded1afc78773

                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                          9d7ce397b67e704773f7a9ea6c9cd1e5345f2211a67ac5dd5f622118690ed295a18e763c47e5c208240f71d4bedb67ba1e869faff466602f8e97350f9df9495c

                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ewyasj.exe

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          161KB

                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                          a2e166ef9ba63b78150b9e08767d0764

                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                          885c223c8436ee6184f6335f3bcf7bd761e85319

                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                          0626693b0820897af0b56b9092439ce955a2435b610127d1686ea256eddc230f

                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                          04651a2f9f4d648b95e7a5e67a1e1ddbaa12d8d2d1fecbf2da956b58826ad2f0aee2b1e182b1beab3f73215185f7c402df67fed4e0bcf401a2eea64ec34c627b

                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\gwxgkl.exe

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          151KB

                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                          5cdc9671612660bd34747c635218a649

                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                          8cebfbdfc27689d9988d4512da7d855c13eb8e0b

                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                          119b3e5a0b2aad4dc9a6a7376dde77e80826830a24a08aefd858710e79a11db9

                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                          a33bfb9c9db6469274a38bee8038fa7a86b2e336e48776bee788b7b2b372556b5880253cdc7856339130ca8b29c199a739020e78ca29cc401f441e2ac18280ef

                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ksmgze.exe

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          30KB

                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                          d8a05fae946f16dbb12d5489f2b68230

                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                          f8068ceb85905539ed39dc4dc187088487b09e17

                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                          7876b3d0721a40d4d80f873be9ff79e722e28bd24ba0ee9ab9faac5c7aa69899

                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                          661fc778e40c260756d928fe3bed91c3cbc8884ac27a071e1bf3c8f97c9133bd4bd853371baed477a3988305c12e1c405d03059f8652d810a23eb6050f6ade77

                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\mwyegr.exe

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          156KB

                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                          e2cf7cb958bda8d948e80bdb78d6e283

                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                          34c18cf619966914046b7a8f9070b0ee9ca0523d

                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                          07f878b812dc294a61fb6030dffab309e4a05bef322759a198f110aa88c3b402

                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                          3197a3a08069a2a33cea248503132dff4369efe6b83d13db61ef5be81e26f5c3f57ecba9c31e73754f321848dcf491f19eb0249f5f182c2332ae0879ed84b56c

                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\puuhhq.exe

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          34KB

                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                          950d739da650457fab6a225545794238

                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                          e965286161ecda1b8c0072d8a2d80c191bb15705

                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                          a571fcac5384158c4927e7c7cf07182b68eccf67845ba927beae44cd9835e3f8

                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                          b7b91343176c5a7f6408b21fbc96c23d0b02c080b846e29f304ba91de1d0f37a772953e7ab65d1d627cb3490fbef3b85681564e878d8dcda57c0897dbad1d19b

                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\vgonvu.exe

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          152KB

                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                          c0a4054bc0a6553d3a246d91e6cdc95b

                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                          b8722a0cf5483539ce965098fb299ad129d1a36b

                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                          0c20402e4957de72ae5e6c5ce00d0dfab6a49affb260996b3290d44264977909

                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                          5f5e88e876e6363992cd28794203874d27fc204bc7df004d32bfa18ebd0797c8c89ccb6b4cc44d4bdf6a9b476d5be5bec2a91bdc7020ba7b3628b98c9587ea5e

                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\vpydtm.exe

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          161KB

                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                          760aa2ef40d31c55f0019cc916e9de48

                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                          0228e46ca0a0303bebf54a65bf5da8111c4de402

                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                          7ae58db4879d8daf291c5eab58ca9b49bc1b5c63153a02d175d83406a71a2806

                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                          ce85a4af522b22d696ff98e176e2f97280363ac5e4161e39dac8cb0404af8d20fc4efe0ddd9e39cfa07bef28b65960c9a56822c6436b715f37ec6df9bd512d04

                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\vulrhu.exe

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          159KB

                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                          49a6b6e8627762b929999b0b1fe6d604

                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                          4a47bbb17c6cbda79794428df97d203b7261af79

                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                          ca6aa52d419303376de2c37b4c8f6bdd41e31e55de6d178520ad5056303b6571

                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                          c967dcb9be6b1fa73f1ef50a7785c17919365857be63923c6cad53362931d9a1c9fb41a43d68a050ad2a50239580fc8294e61e2ba10ee19d185f4f91c035b85b

                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\15415145.exe

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          59KB

                                                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                                                          6c091ad6fae0fa76f44870d1a1b05cb4

                                                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                                                          040f60c0ee3f4902f919025057e34ab4d11b1abd

                                                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                                                          c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390

                                                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                                                          3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86

                                                                                                                                                                                                                                                                                                        • memory/248-1231-0x0000000000360000-0x000000000038E000-memory.dmp

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          184KB

                                                                                                                                                                                                                                                                                                        • memory/752-217-0x00000000002A0000-0x00000000002CE000-memory.dmp

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          184KB

                                                                                                                                                                                                                                                                                                        • memory/1224-399-0x0000000000DD0000-0x0000000000DFE000-memory.dmp

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          184KB

                                                                                                                                                                                                                                                                                                        • memory/1392-1639-0x0000000000BB0000-0x0000000000BDE000-memory.dmp

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          184KB

                                                                                                                                                                                                                                                                                                        • memory/1964-12-0x00007FF8EEB90000-0x00007FF8EF652000-memory.dmp

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          10.8MB

                                                                                                                                                                                                                                                                                                        • memory/1964-11-0x00007FF8EEB93000-0x00007FF8EEB95000-memory.dmp

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          8KB

                                                                                                                                                                                                                                                                                                        • memory/1964-1-0x0000000000770000-0x0000000000786000-memory.dmp

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          88KB

                                                                                                                                                                                                                                                                                                        • memory/1964-10-0x00007FF8EEB90000-0x00007FF8EF652000-memory.dmp

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          10.8MB

                                                                                                                                                                                                                                                                                                        • memory/1964-0-0x00007FF8EEB93000-0x00007FF8EEB95000-memory.dmp

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          8KB

                                                                                                                                                                                                                                                                                                        • memory/2144-17-0x00007FF8EEB90000-0x00007FF8EF652000-memory.dmp

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          10.8MB

                                                                                                                                                                                                                                                                                                        • memory/2144-15-0x00007FF8EEB90000-0x00007FF8EF652000-memory.dmp

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          10.8MB

                                                                                                                                                                                                                                                                                                        • memory/2328-470-0x00000000003B0000-0x00000000003DC000-memory.dmp

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          176KB

                                                                                                                                                                                                                                                                                                        • memory/2472-36-0x0000026BF9060000-0x0000026BF9082000-memory.dmp

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          136KB

                                                                                                                                                                                                                                                                                                        • memory/2796-1436-0x0000000000490000-0x00000000004BE000-memory.dmp

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          184KB

                                                                                                                                                                                                                                                                                                        • memory/3044-327-0x0000000000790000-0x00000000007C0000-memory.dmp

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          192KB

                                                                                                                                                                                                                                                                                                        • memory/3544-569-0x0000000000D40000-0x0000000000D4E000-memory.dmp

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          56KB

                                                                                                                                                                                                                                                                                                        • memory/4388-30-0x00000000000E0000-0x00000000000EE000-memory.dmp

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          56KB

                                                                                                                                                                                                                                                                                                        • memory/4612-710-0x0000000000F70000-0x0000000000F9C000-memory.dmp

                                                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                                                          176KB