Analysis

  • max time kernel
    4294211s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220223-en
  • submitted
    08-03-2022 19:14

General

  • Target

    426855460608fcd9c1b2373a1a7190cfa7f91c9b1a4d04658af45a95053c9064.exe

  • Size

    340KB

  • MD5

    92ee38e8d9fe99d649037bafb1e9e3ce

  • SHA1

    3713b8781411d2e0d948dfb932ac28e92bc8047b

  • SHA256

    426855460608fcd9c1b2373a1a7190cfa7f91c9b1a4d04658af45a95053c9064

  • SHA512

    3d026f98cdc0bbcfbdfe01c47af000f28c4a76b8c4a904ea14f52f82e617ba0c56e10f9eb7b11edf78267cd949e18d98bfd5a120f04a8650e3c680f959914d10

Malware Config

Signatures

  • ISR Stealer

    ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

  • ISR Stealer Payload 2 IoCs
  • NirSoft MailPassView 6 IoCs

    Password recovery tool for various email clients

  • Nirsoft 6 IoCs
  • Executes dropped EXE 55 IoCs
  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 11 IoCs
  • Adds Run key to start application 2 TTPs 64 IoCs
  • Suspicious use of SetThreadContext 39 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\426855460608fcd9c1b2373a1a7190cfa7f91c9b1a4d04658af45a95053c9064.exe
    "C:\Users\Admin\AppData\Local\Temp\426855460608fcd9c1b2373a1a7190cfa7f91c9b1a4d04658af45a95053c9064.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1788
    • C:\Windows\SysWOW64\cmd.exe
      "cmd"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1112
      • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
        "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2000
        • C:\Windows\SysWOW64\cmd.exe
          "cmd"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1968
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
            5⤵
            • Adds Run key to start application
            PID:1792
        • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
          "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:480
          • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
            /scomma "C:\Users\Admin\AppData\Local\Temp\9LIGWGhqgF.ini"
            5⤵
            • Executes dropped EXE
            PID:1816
          • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
            /scomma "C:\Users\Admin\AppData\Local\Temp\VR3tc89Oze.ini"
            5⤵
            • Executes dropped EXE
            • Accesses Microsoft Outlook accounts
            PID:468
        • C:\Windows\SysWOW64\cmd.exe
          "cmd"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:708
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
            5⤵
            • Adds Run key to start application
            PID:1068
        • C:\Windows\SysWOW64\cmd.exe
          "cmd"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1176
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
            5⤵
              PID:1932
          • C:\Windows\SysWOW64\cmd.exe
            "cmd"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1928
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
              5⤵
                PID:1416
            • C:\Windows\SysWOW64\cmd.exe
              "cmd"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1764
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                5⤵
                • Adds Run key to start application
                PID:1656
            • C:\Windows\SysWOW64\cmd.exe
              "cmd"
              4⤵
                PID:364
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                  5⤵
                  • Adds Run key to start application
                  PID:1760
              • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                4⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                PID:1628
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd"
                  5⤵
                    PID:1504
                    • C:\Windows\SysWOW64\reg.exe
                      reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                      6⤵
                      • Adds Run key to start application
                      PID:1112
                  • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                    "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of SetWindowsHookEx
                    PID:2016
                    • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                      /scomma "C:\Users\Admin\AppData\Local\Temp\D7xHSS5fDc.ini"
                      6⤵
                      • Executes dropped EXE
                      PID:636
                    • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                      /scomma "C:\Users\Admin\AppData\Local\Temp\tqFFnvruQP.ini"
                      6⤵
                      • Executes dropped EXE
                      • Accesses Microsoft Outlook accounts
                      PID:1816
                  • C:\Windows\SysWOW64\cmd.exe
                    "cmd"
                    5⤵
                      PID:1644
                      • C:\Windows\SysWOW64\reg.exe
                        reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                        6⤵
                        • Adds Run key to start application
                        PID:1256
                    • C:\Windows\SysWOW64\cmd.exe
                      "cmd"
                      5⤵
                        PID:1916
                        • C:\Windows\SysWOW64\reg.exe
                          reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                          6⤵
                            PID:932
                        • C:\Windows\SysWOW64\cmd.exe
                          "cmd"
                          5⤵
                            PID:1688
                            • C:\Windows\SysWOW64\reg.exe
                              reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                              6⤵
                              • Adds Run key to start application
                              PID:1484
                          • C:\Windows\SysWOW64\cmd.exe
                            "cmd"
                            5⤵
                              PID:1796
                              • C:\Windows\SysWOW64\reg.exe
                                reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                6⤵
                                • Adds Run key to start application
                                PID:1900
                            • C:\Windows\SysWOW64\cmd.exe
                              "cmd"
                              5⤵
                                PID:1264
                                • C:\Windows\SysWOW64\reg.exe
                                  reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                  6⤵
                                  • Adds Run key to start application
                                  PID:1176
                              • C:\Windows\SysWOW64\cmd.exe
                                "cmd"
                                5⤵
                                  PID:1788
                                  • C:\Windows\SysWOW64\reg.exe
                                    reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                    6⤵
                                      PID:1408
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "cmd"
                                    5⤵
                                      PID:2000
                                      • C:\Windows\SysWOW64\reg.exe
                                        reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                        6⤵
                                        • Adds Run key to start application
                                        PID:2008
                                    • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                      "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                                      5⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetThreadContext
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1936
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "cmd"
                                        6⤵
                                          PID:2036
                                          • C:\Windows\SysWOW64\reg.exe
                                            reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                            7⤵
                                              PID:944
                                          • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                            "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                                            6⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetThreadContext
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1712
                                            • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                              /scomma "C:\Users\Admin\AppData\Local\Temp\RTrhmkSxCE.ini"
                                              7⤵
                                              • Executes dropped EXE
                                              PID:1044
                                            • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                              /scomma "C:\Users\Admin\AppData\Local\Temp\79QQ4XelD1.ini"
                                              7⤵
                                              • Executes dropped EXE
                                              • Accesses Microsoft Outlook accounts
                                              PID:1332
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "cmd"
                                            6⤵
                                              PID:1968
                                              • C:\Windows\SysWOW64\reg.exe
                                                reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                7⤵
                                                  PID:592
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "cmd"
                                                6⤵
                                                  PID:1416
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                    7⤵
                                                      PID:2028
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "cmd"
                                                    6⤵
                                                      PID:1448
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                        7⤵
                                                          PID:1648
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "cmd"
                                                        6⤵
                                                          PID:1496
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                            7⤵
                                                            • Adds Run key to start application
                                                            PID:512
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          "cmd"
                                                          6⤵
                                                            PID:576
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                              7⤵
                                                              • Adds Run key to start application
                                                              PID:1476
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "cmd"
                                                            6⤵
                                                              PID:1856
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                7⤵
                                                                  PID:1696
                                                              • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetThreadContext
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:568
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  "cmd"
                                                                  7⤵
                                                                    PID:1792
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                      8⤵
                                                                      • Adds Run key to start application
                                                                      PID:1532
                                                                  • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                    "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                                                                    7⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetThreadContext
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:708
                                                                    • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                      /scomma "C:\Users\Admin\AppData\Local\Temp\MdfS3JVUcr.ini"
                                                                      8⤵
                                                                      • Executes dropped EXE
                                                                      PID:1264
                                                                    • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                      /scomma "C:\Users\Admin\AppData\Local\Temp\XmlgPCdrlk.ini"
                                                                      8⤵
                                                                      • Executes dropped EXE
                                                                      • Accesses Microsoft Outlook accounts
                                                                      PID:852
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    "cmd"
                                                                    7⤵
                                                                      PID:868
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                        8⤵
                                                                          PID:1448
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        "cmd"
                                                                        7⤵
                                                                          PID:1476
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                            8⤵
                                                                            • Adds Run key to start application
                                                                            PID:676
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          "cmd"
                                                                          7⤵
                                                                            PID:1044
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                              8⤵
                                                                              • Adds Run key to start application
                                                                              PID:1568
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            "cmd"
                                                                            7⤵
                                                                              PID:1840
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                8⤵
                                                                                  PID:832
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                "cmd"
                                                                                7⤵
                                                                                  PID:1936
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                    8⤵
                                                                                      PID:1916
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    "cmd"
                                                                                    7⤵
                                                                                      PID:592
                                                                                    • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                      "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                                                                                      7⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of SetThreadContext
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:1064
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        "cmd"
                                                                                        8⤵
                                                                                          PID:1532
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                            9⤵
                                                                                              PID:1976
                                                                                          • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                            "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                                                                                            8⤵
                                                                                            • Executes dropped EXE
                                                                                            • Suspicious use of SetThreadContext
                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                            PID:1992
                                                                                            • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                              /scomma "C:\Users\Admin\AppData\Local\Temp\Rm3pM2RQXz.ini"
                                                                                              9⤵
                                                                                              • Executes dropped EXE
                                                                                              PID:1824
                                                                                            • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                              /scomma "C:\Users\Admin\AppData\Local\Temp\ItHVqGKAjE.ini"
                                                                                              9⤵
                                                                                              • Executes dropped EXE
                                                                                              • Accesses Microsoft Outlook accounts
                                                                                              PID:1528
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            "cmd"
                                                                                            8⤵
                                                                                              PID:676
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                9⤵
                                                                                                • Adds Run key to start application
                                                                                                PID:1712
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              "cmd"
                                                                                              8⤵
                                                                                                PID:1828
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                  9⤵
                                                                                                  • Adds Run key to start application
                                                                                                  PID:1932
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                "cmd"
                                                                                                8⤵
                                                                                                  PID:1696
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                    9⤵
                                                                                                    • Adds Run key to start application
                                                                                                    PID:1408
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  "cmd"
                                                                                                  8⤵
                                                                                                    PID:1256
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                      9⤵
                                                                                                      • Adds Run key to start application
                                                                                                      PID:1232
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    "cmd"
                                                                                                    8⤵
                                                                                                      PID:568
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                        9⤵
                                                                                                        • Adds Run key to start application
                                                                                                        PID:1628
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      "cmd"
                                                                                                      8⤵
                                                                                                        PID:1880
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                          9⤵
                                                                                                            PID:1344
                                                                                                        • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                          "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                                                                                                          8⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Suspicious use of SetThreadContext
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:2032
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            "cmd"
                                                                                                            9⤵
                                                                                                              PID:1780
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                10⤵
                                                                                                                  PID:1396
                                                                                                              • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                                                                                                                9⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                PID:1072
                                                                                                                • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                  /scomma "C:\Users\Admin\AppData\Local\Temp\XOSl7Bl7U3.ini"
                                                                                                                  10⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  PID:1560
                                                                                                                • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                  /scomma "C:\Users\Admin\AppData\Local\Temp\Ox4FJjNca2.ini"
                                                                                                                  10⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Accesses Microsoft Outlook accounts
                                                                                                                  PID:1880
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                "cmd"
                                                                                                                9⤵
                                                                                                                  PID:1332
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                    10⤵
                                                                                                                    • Adds Run key to start application
                                                                                                                    PID:1136
                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                  "cmd"
                                                                                                                  9⤵
                                                                                                                    PID:944
                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                      reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                      10⤵
                                                                                                                        PID:580
                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                      "cmd"
                                                                                                                      9⤵
                                                                                                                        PID:1628
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                          10⤵
                                                                                                                          • Adds Run key to start application
                                                                                                                          PID:1260
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        "cmd"
                                                                                                                        9⤵
                                                                                                                          PID:1688
                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                            reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                            10⤵
                                                                                                                              PID:2008
                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                            "cmd"
                                                                                                                            9⤵
                                                                                                                              PID:1220
                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                10⤵
                                                                                                                                  PID:1784
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                "cmd"
                                                                                                                                9⤵
                                                                                                                                  PID:980
                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                    reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                    10⤵
                                                                                                                                    • Adds Run key to start application
                                                                                                                                    PID:1536
                                                                                                                                • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                  "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                                                                                                                                  9⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                  PID:1828
                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                    "cmd"
                                                                                                                                    10⤵
                                                                                                                                      PID:1968
                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                        reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                        11⤵
                                                                                                                                        • Adds Run key to start application
                                                                                                                                        PID:2016
                                                                                                                                    • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                      "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                                                                                                                                      10⤵
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                      PID:1232
                                                                                                                                      • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                        /scomma "C:\Users\Admin\AppData\Local\Temp\4p4DtNZT4J.ini"
                                                                                                                                        11⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        PID:1564
                                                                                                                                      • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                        /scomma "C:\Users\Admin\AppData\Local\Temp\qQAPSMHaYT.ini"
                                                                                                                                        11⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Accesses Microsoft Outlook accounts
                                                                                                                                        PID:1804
                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                      "cmd"
                                                                                                                                      10⤵
                                                                                                                                        PID:568
                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                          reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                          11⤵
                                                                                                                                          • Adds Run key to start application
                                                                                                                                          PID:1628
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        "cmd"
                                                                                                                                        10⤵
                                                                                                                                          PID:364
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                            11⤵
                                                                                                                                            • Adds Run key to start application
                                                                                                                                            PID:2008
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          "cmd"
                                                                                                                                          10⤵
                                                                                                                                            PID:1592
                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                              reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                              11⤵
                                                                                                                                                PID:896
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              "cmd"
                                                                                                                                              10⤵
                                                                                                                                                PID:752
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                  11⤵
                                                                                                                                                  • Adds Run key to start application
                                                                                                                                                  PID:1680
                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                "cmd"
                                                                                                                                                10⤵
                                                                                                                                                  PID:1536
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                    11⤵
                                                                                                                                                    • Adds Run key to start application
                                                                                                                                                    PID:1932
                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  "cmd"
                                                                                                                                                  10⤵
                                                                                                                                                    PID:636
                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                      reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                      11⤵
                                                                                                                                                        PID:1504
                                                                                                                                                    • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                      "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                                                                                                                                                      10⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                      PID:1256
                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                        "cmd"
                                                                                                                                                        11⤵
                                                                                                                                                          PID:1236
                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                            reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                            12⤵
                                                                                                                                                            • Adds Run key to start application
                                                                                                                                                            PID:1052
                                                                                                                                                        • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                          "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                                                                                                                                                          11⤵
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          PID:1528
                                                                                                                                                        • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                          "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                                                                                                                                                          11⤵
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                          PID:1840
                                                                                                                                                          • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                            /scomma "C:\Users\Admin\AppData\Local\Temp\GJSa8kIrEt.ini"
                                                                                                                                                            12⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            PID:1424
                                                                                                                                                          • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                            /scomma "C:\Users\Admin\AppData\Local\Temp\2tahv09ZvN.ini"
                                                                                                                                                            12⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            PID:1992
                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                          "cmd"
                                                                                                                                                          11⤵
                                                                                                                                                            PID:1976
                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                              reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                              12⤵
                                                                                                                                                              • Adds Run key to start application
                                                                                                                                                              PID:1384
                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                            "cmd"
                                                                                                                                                            11⤵
                                                                                                                                                              PID:1764
                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                12⤵
                                                                                                                                                                • Adds Run key to start application
                                                                                                                                                                PID:1856
                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                              "cmd"
                                                                                                                                                              11⤵
                                                                                                                                                                PID:800
                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                  reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                  12⤵
                                                                                                                                                                    PID:304
                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                  "cmd"
                                                                                                                                                                  11⤵
                                                                                                                                                                    PID:1676
                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                      reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                      12⤵
                                                                                                                                                                      • Adds Run key to start application
                                                                                                                                                                      PID:1568
                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    "cmd"
                                                                                                                                                                    11⤵
                                                                                                                                                                      PID:1796
                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                        reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                        12⤵
                                                                                                                                                                        • Adds Run key to start application
                                                                                                                                                                        PID:1668
                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                      "cmd"
                                                                                                                                                                      11⤵
                                                                                                                                                                        PID:1136
                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                          reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                          12⤵
                                                                                                                                                                          • Adds Run key to start application
                                                                                                                                                                          PID:868
                                                                                                                                                                      • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                                        "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                                                                                                                                                                        11⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                        PID:1700
                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                          "cmd"
                                                                                                                                                                          12⤵
                                                                                                                                                                            PID:1900
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                              13⤵
                                                                                                                                                                              • Adds Run key to start application
                                                                                                                                                                              PID:1820
                                                                                                                                                                          • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                                            "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                                                                                                                                                                            12⤵
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                            PID:480
                                                                                                                                                                            • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                                              /scomma "C:\Users\Admin\AppData\Local\Temp\q1xA7UxD97.ini"
                                                                                                                                                                              13⤵
                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                              PID:932
                                                                                                                                                                            • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                                              /scomma "C:\Users\Admin\AppData\Local\Temp\fGjXe5AmZj.ini"
                                                                                                                                                                              13⤵
                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                              • Accesses Microsoft Outlook accounts
                                                                                                                                                                              PID:1536
                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                            "cmd"
                                                                                                                                                                            12⤵
                                                                                                                                                                              PID:1872
                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                13⤵
                                                                                                                                                                                • Adds Run key to start application
                                                                                                                                                                                PID:1680
                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                              "cmd"
                                                                                                                                                                              12⤵
                                                                                                                                                                                PID:1268
                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                  reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                  13⤵
                                                                                                                                                                                    PID:980
                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                  "cmd"
                                                                                                                                                                                  12⤵
                                                                                                                                                                                    PID:1740
                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                      reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                      13⤵
                                                                                                                                                                                      • Adds Run key to start application
                                                                                                                                                                                      PID:976
                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                    "cmd"
                                                                                                                                                                                    12⤵
                                                                                                                                                                                      PID:848
                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                        reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                        13⤵
                                                                                                                                                                                          PID:1788
                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                        "cmd"
                                                                                                                                                                                        12⤵
                                                                                                                                                                                          PID:1232
                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                            reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                            13⤵
                                                                                                                                                                                            • Adds Run key to start application
                                                                                                                                                                                            PID:1628
                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                          "cmd"
                                                                                                                                                                                          12⤵
                                                                                                                                                                                            PID:1868
                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                              reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                              13⤵
                                                                                                                                                                                              • Adds Run key to start application
                                                                                                                                                                                              PID:804
                                                                                                                                                                                          • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                                                            "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                                                                                                                                                                                            12⤵
                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                            PID:1556
                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                              "cmd"
                                                                                                                                                                                              13⤵
                                                                                                                                                                                                PID:1864
                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                  reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                                  14⤵
                                                                                                                                                                                                    PID:1432
                                                                                                                                                                                                • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                                                                  "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                                                                                                                                                                                                  13⤵
                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                  PID:1532
                                                                                                                                                                                                  • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                                                                    /scomma "C:\Users\Admin\AppData\Local\Temp\TO61qZyQmS.ini"
                                                                                                                                                                                                    14⤵
                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                    PID:1564
                                                                                                                                                                                                  • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                                                                    /scomma "C:\Users\Admin\AppData\Local\Temp\n8MssfgUha.ini"
                                                                                                                                                                                                    14⤵
                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                    PID:1504
                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                  "cmd"
                                                                                                                                                                                                  13⤵
                                                                                                                                                                                                    PID:800
                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                      reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                                      14⤵
                                                                                                                                                                                                      • Adds Run key to start application
                                                                                                                                                                                                      PID:1416
                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                    "cmd"
                                                                                                                                                                                                    13⤵
                                                                                                                                                                                                      PID:980
                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                        reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                                        14⤵
                                                                                                                                                                                                        • Adds Run key to start application
                                                                                                                                                                                                        PID:1424
                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                      "cmd"
                                                                                                                                                                                                      13⤵
                                                                                                                                                                                                        PID:852
                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                          reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                                          14⤵
                                                                                                                                                                                                          • Adds Run key to start application
                                                                                                                                                                                                          PID:1408
                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                        "cmd"
                                                                                                                                                                                                        13⤵
                                                                                                                                                                                                          PID:840
                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                            reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                                            14⤵
                                                                                                                                                                                                              PID:1676
                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                            "cmd"
                                                                                                                                                                                                            13⤵
                                                                                                                                                                                                              PID:1796
                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                                                14⤵
                                                                                                                                                                                                                  PID:1536
                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                "cmd"
                                                                                                                                                                                                                13⤵
                                                                                                                                                                                                                  PID:1688
                                                                                                                                                                                                                • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                                                                                  "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                                                                                                                                                                                                                  13⤵
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                  PID:1052
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                    "cmd"
                                                                                                                                                                                                                    14⤵
                                                                                                                                                                                                                      PID:1880
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                        reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                                                        15⤵
                                                                                                                                                                                                                        • Adds Run key to start application
                                                                                                                                                                                                                        PID:908
                                                                                                                                                                                                                    • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                                                                                      "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                                                                                                                                                                                                                      14⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      PID:112
                                                                                                                                                                                                                    • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                                                                                      "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                                                                                                                                                                                                                      14⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                      PID:1872
                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                                                                                        /scomma "C:\Users\Admin\AppData\Local\Temp\wCzI5YqIne.ini"
                                                                                                                                                                                                                        15⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        PID:800
                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                                                                                        /scomma "C:\Users\Admin\AppData\Local\Temp\DmdNVSFnbJ.ini"
                                                                                                                                                                                                                        15⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Accesses Microsoft Outlook accounts
                                                                                                                                                                                                                        PID:1536
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                      "cmd"
                                                                                                                                                                                                                      14⤵
                                                                                                                                                                                                                        PID:1720
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                          reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                                                          15⤵
                                                                                                                                                                                                                          • Adds Run key to start application
                                                                                                                                                                                                                          PID:1500
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                        "cmd"
                                                                                                                                                                                                                        14⤵
                                                                                                                                                                                                                          PID:944
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                            reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                                                            15⤵
                                                                                                                                                                                                                              PID:1616
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                            "cmd"
                                                                                                                                                                                                                            14⤵
                                                                                                                                                                                                                              PID:1664
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                                                                15⤵
                                                                                                                                                                                                                                  PID:1424
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                "cmd"
                                                                                                                                                                                                                                14⤵
                                                                                                                                                                                                                                  PID:1676
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                    reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                                                                    15⤵
                                                                                                                                                                                                                                    • Adds Run key to start application
                                                                                                                                                                                                                                    PID:1140
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                  "cmd"
                                                                                                                                                                                                                                  14⤵
                                                                                                                                                                                                                                    PID:280
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                      reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                                                                      15⤵
                                                                                                                                                                                                                                      • Adds Run key to start application
                                                                                                                                                                                                                                      PID:1136
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                    "cmd"
                                                                                                                                                                                                                                    14⤵
                                                                                                                                                                                                                                      PID:968
                                                                                                                                                                                                                                    • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                                                                                                                                                                                                                                      14⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:1636
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                        "cmd"
                                                                                                                                                                                                                                        15⤵
                                                                                                                                                                                                                                          PID:1812
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                            reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                                                                            16⤵
                                                                                                                                                                                                                                            • Adds Run key to start application
                                                                                                                                                                                                                                            PID:1548
                                                                                                                                                                                                                                        • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                                                                                                                                                                                                                                          15⤵
                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                          PID:340
                                                                                                                                                                                                                                        • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                                                                                                                                                                                                                                          15⤵
                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                          PID:1764
                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                                                                                                            /scomma "C:\Users\Admin\AppData\Local\Temp\xhlBnDO504.ini"
                                                                                                                                                                                                                                            16⤵
                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                            PID:1880
                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                                                                                                            /scomma "C:\Users\Admin\AppData\Local\Temp\LdLTRuAHOA.ini"
                                                                                                                                                                                                                                            16⤵
                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                            • Accesses Microsoft Outlook accounts
                                                                                                                                                                                                                                            PID:1828
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                          "cmd"
                                                                                                                                                                                                                                          15⤵
                                                                                                                                                                                                                                            PID:1660
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                              reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                                                                              16⤵
                                                                                                                                                                                                                                              • Adds Run key to start application
                                                                                                                                                                                                                                              PID:2000
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                            "cmd"
                                                                                                                                                                                                                                            15⤵
                                                                                                                                                                                                                                              PID:2008
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                                                                                16⤵
                                                                                                                                                                                                                                                • Adds Run key to start application
                                                                                                                                                                                                                                                PID:1008
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                              "cmd"
                                                                                                                                                                                                                                              15⤵
                                                                                                                                                                                                                                                PID:1264
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                  reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                                                                                  16⤵
                                                                                                                                                                                                                                                  • Adds Run key to start application
                                                                                                                                                                                                                                                  PID:1664
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                "cmd"
                                                                                                                                                                                                                                                15⤵
                                                                                                                                                                                                                                                  PID:1564
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                    reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                                                                                    16⤵
                                                                                                                                                                                                                                                    • Adds Run key to start application
                                                                                                                                                                                                                                                    PID:1448
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                  "cmd"
                                                                                                                                                                                                                                                  15⤵
                                                                                                                                                                                                                                                    PID:1864
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                      reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                                                                                      16⤵
                                                                                                                                                                                                                                                      • Adds Run key to start application
                                                                                                                                                                                                                                                      PID:1512
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                    "cmd"
                                                                                                                                                                                                                                                    15⤵
                                                                                                                                                                                                                                                      PID:1308
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                        reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                                                                                        16⤵
                                                                                                                                                                                                                                                        • Adds Run key to start application
                                                                                                                                                                                                                                                        PID:1368
                                                                                                                                                                                                                                                    • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                                                                                                                      "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                                                                                                                                                                                                                                                      15⤵
                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                      PID:896
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                        "cmd"
                                                                                                                                                                                                                                                        16⤵
                                                                                                                                                                                                                                                          PID:1948
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                            reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                                                                                            17⤵
                                                                                                                                                                                                                                                            • Adds Run key to start application
                                                                                                                                                                                                                                                            PID:652
                                                                                                                                                                                                                                                        • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                                                                                                                          "C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe"
                                                                                                                                                                                                                                                          16⤵
                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                          PID:1416
                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                                                                                                                            /scomma "C:\Users\Admin\AppData\Local\Temp\PGSyo4CX3o.ini"
                                                                                                                                                                                                                                                            17⤵
                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                            PID:1384
                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\scscscscscscacaacacsfdf\filename.exe
                                                                                                                                                                                                                                                            /scomma "C:\Users\Admin\AppData\Local\Temp\Idv3ljHIRp.ini"
                                                                                                                                                                                                                                                            17⤵
                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                            • Accesses Microsoft Outlook accounts
                                                                                                                                                                                                                                                            PID:800
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                          "cmd"
                                                                                                                                                                                                                                                          16⤵
                                                                                                                                                                                                                                                            PID:2004
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                              reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                                                                                              17⤵
                                                                                                                                                                                                                                                                PID:2000
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                              "cmd"
                                                                                                                                                                                                                                                              16⤵
                                                                                                                                                                                                                                                                PID:676
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                  reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                                                                                                  17⤵
                                                                                                                                                                                                                                                                  • Adds Run key to start application
                                                                                                                                                                                                                                                                  PID:980
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                "cmd"
                                                                                                                                                                                                                                                                16⤵
                                                                                                                                                                                                                                                                  PID:852
                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                    reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                                                                                                    17⤵
                                                                                                                                                                                                                                                                      PID:1664
                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                    "cmd"
                                                                                                                                                                                                                                                                    16⤵
                                                                                                                                                                                                                                                                      PID:1004
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                        reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                                                                                                        17⤵
                                                                                                                                                                                                                                                                          PID:1784
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                        "cmd"
                                                                                                                                                                                                                                                                        16⤵
                                                                                                                                                                                                                                                                          PID:952
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                            reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"
                                                                                                                                                                                                                                                                            17⤵
                                                                                                                                                                                                                                                                            • Adds Run key to start application
                                                                                                                                                                                                                                                                            PID:1668

                                                                                                                                                                                                                                          Network

                                                                                                                                                                                                                                          MITRE ATT&CK Enterprise v6

                                                                                                                                                                                                                                          Replay Monitor

                                                                                                                                                                                                                                          Loading Replay Monitor...

                                                                                                                                                                                                                                          Downloads

                                                                                                                                                                                                                                          • memory/468-89-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            124KB

                                                                                                                                                                                                                                          • memory/468-88-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            124KB

                                                                                                                                                                                                                                          • memory/468-83-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            124KB

                                                                                                                                                                                                                                          • memory/468-87-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            124KB

                                                                                                                                                                                                                                          • memory/480-70-0x0000000000400000-0x0000000000442000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            264KB

                                                                                                                                                                                                                                          • memory/480-68-0x0000000000400000-0x0000000000442000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            264KB

                                                                                                                                                                                                                                          • memory/480-66-0x0000000000400000-0x0000000000442000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            264KB

                                                                                                                                                                                                                                          • memory/480-64-0x0000000000400000-0x0000000000442000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            264KB

                                                                                                                                                                                                                                          • memory/568-162-0x00000000741A0000-0x000000007474B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/568-161-0x0000000000820000-0x0000000000821000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/568-160-0x00000000741A0000-0x000000007474B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/636-112-0x0000000000400000-0x0000000000453000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            332KB

                                                                                                                                                                                                                                          • memory/636-108-0x0000000000400000-0x0000000000453000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            332KB

                                                                                                                                                                                                                                          • memory/636-113-0x0000000000400000-0x0000000000453000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            332KB

                                                                                                                                                                                                                                          • memory/636-114-0x0000000000400000-0x0000000000453000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            332KB

                                                                                                                                                                                                                                          • memory/896-462-0x00000000741A0000-0x000000007474B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/896-461-0x0000000000950000-0x0000000000951000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/896-460-0x00000000741A0000-0x000000007474B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/1044-144-0x0000000000400000-0x0000000000453000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            332KB

                                                                                                                                                                                                                                          • memory/1044-143-0x0000000000400000-0x0000000000453000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            332KB

                                                                                                                                                                                                                                          • memory/1044-145-0x0000000000400000-0x0000000000453000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            332KB

                                                                                                                                                                                                                                          • memory/1052-389-0x00000000741A0000-0x000000007474B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/1052-388-0x0000000000A20000-0x0000000000A21000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1052-387-0x00000000741A0000-0x000000007474B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/1064-215-0x0000000000A10000-0x0000000000A11000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1064-216-0x00000000741A0000-0x000000007474B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/1064-214-0x00000000741A0000-0x000000007474B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/1256-315-0x0000000073BF0000-0x000000007419B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/1256-317-0x0000000000640000-0x0000000000641000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1256-318-0x0000000073BF0000-0x000000007419B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/1332-156-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            124KB

                                                                                                                                                                                                                                          • memory/1332-155-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            124KB

                                                                                                                                                                                                                                          • memory/1332-157-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            124KB

                                                                                                                                                                                                                                          • memory/1556-380-0x0000000000480000-0x0000000000481000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1556-379-0x00000000741A0000-0x000000007474B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/1556-381-0x00000000741A0000-0x000000007474B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/1628-94-0x0000000073BF0000-0x000000007419B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/1628-92-0x0000000073BF0000-0x000000007419B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/1628-93-0x0000000000280000-0x0000000000281000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1636-415-0x00000000741A0000-0x000000007474B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/1636-417-0x00000000741A0000-0x000000007474B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/1636-416-0x0000000000CD0000-0x0000000000CD1000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1700-346-0x0000000000A30000-0x0000000000A31000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1700-345-0x0000000073BF0000-0x000000007419B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/1700-347-0x0000000073BF0000-0x000000007419B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/1788-57-0x00000000741A0000-0x000000007474B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/1788-56-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1788-54-0x0000000075251000-0x0000000075253000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                          • memory/1788-55-0x00000000741A0000-0x000000007474B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/1816-123-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            124KB

                                                                                                                                                                                                                                          • memory/1816-122-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            124KB

                                                                                                                                                                                                                                          • memory/1816-121-0x0000000000400000-0x000000000041F000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            124KB

                                                                                                                                                                                                                                          • memory/1828-283-0x00000000741A0000-0x000000007474B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/1828-281-0x00000000741A0000-0x000000007474B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/1828-282-0x0000000000B90000-0x0000000000B91000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1936-146-0x0000000073BF0000-0x000000007419B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/1936-147-0x0000000000BB0000-0x0000000000BB1000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1936-148-0x0000000073BF0000-0x000000007419B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/2000-79-0x0000000073BF0000-0x000000007419B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/2000-82-0x0000000073BF0000-0x000000007419B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/2000-81-0x0000000073BF0000-0x000000007419B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                          • memory/2000-80-0x00000000003F0000-0x00000000003F1000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/2032-249-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/2032-248-0x00000000741A0000-0x000000007474B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.7MB