Analysis

  • max time kernel
    1508s
  • max time network
    1435s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-09-2022 16:16

General

  • Target

    sample

  • Size

    1KB

  • MD5

    563ffac3b2c4488ecd24e81c655ad397

  • SHA1

    28eca35a7ebee2f546b35fff21dfe5e96923a36f

  • SHA256

    558fbd26ccbafc05c9a2b070abba157dd69b0d212b821149b056a7b98644cbad

  • SHA512

    7e969a85fbf142c82961669e31e70f1029126c879602665ae2cd10a487893e4fa0207ea1d1c6ebe360ebadf0b44f834fcaa69de78a076e7edd97b20f0e550fc5

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 33 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks for any installed AV software in registry 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 57 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 7 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\sample
    1⤵
      PID:3088
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4352
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff834d94f50,0x7ff834d94f60,0x7ff834d94f70
        2⤵
          PID:208
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1644 /prefetch:2
          2⤵
            PID:4644
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1988 /prefetch:8
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1980
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2332 /prefetch:8
            2⤵
              PID:4892
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2944 /prefetch:1
              2⤵
                PID:4632
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3136 /prefetch:1
                2⤵
                  PID:4180
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3836 /prefetch:1
                  2⤵
                    PID:3084
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3336
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5012 /prefetch:8
                    2⤵
                      PID:2352
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5144 /prefetch:8
                      2⤵
                        PID:4392
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5124 /prefetch:8
                        2⤵
                          PID:436
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5224 /prefetch:8
                          2⤵
                            PID:4712
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5248 /prefetch:8
                            2⤵
                              PID:928
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5252 /prefetch:8
                              2⤵
                                PID:796
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5356 /prefetch:8
                                2⤵
                                  PID:3488
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:1
                                  2⤵
                                    PID:3620
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:2264
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4048 /prefetch:8
                                    2⤵
                                      PID:4864
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5612 /prefetch:8
                                      2⤵
                                        PID:1784
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3672 /prefetch:8
                                        2⤵
                                          PID:4132
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5628 /prefetch:8
                                          2⤵
                                            PID:764
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5436 /prefetch:8
                                            2⤵
                                              PID:4164
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5316 /prefetch:8
                                              2⤵
                                                PID:1816
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5444 /prefetch:8
                                                2⤵
                                                  PID:4412
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5252 /prefetch:8
                                                  2⤵
                                                    PID:1348
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5012 /prefetch:8
                                                    2⤵
                                                      PID:4408
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5036 /prefetch:8
                                                      2⤵
                                                        PID:4868
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4992 /prefetch:8
                                                        2⤵
                                                          PID:4332
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:1
                                                          2⤵
                                                            PID:2060
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:1
                                                            2⤵
                                                              PID:2936
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:8
                                                              2⤵
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:3936
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2840 /prefetch:1
                                                              2⤵
                                                                PID:2064
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3848 /prefetch:1
                                                                2⤵
                                                                  PID:4412
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3916 /prefetch:8
                                                                  2⤵
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:3136
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3832 /prefetch:1
                                                                  2⤵
                                                                    PID:4928
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5860 /prefetch:8
                                                                    2⤵
                                                                      PID:2944
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5888 /prefetch:8
                                                                      2⤵
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      PID:4628
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1572,6194572002959462341,15652513553078548208,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2996 /prefetch:8
                                                                      2⤵
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      PID:3400
                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                    1⤵
                                                                      PID:1560
                                                                    • C:\Windows\system32\taskmgr.exe
                                                                      "C:\Windows\system32\taskmgr.exe" /4
                                                                      1⤵
                                                                      • Checks SCSI registry key(s)
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      • Suspicious use of FindShellTrayWindow
                                                                      • Suspicious use of SendNotifyMessage
                                                                      PID:2956
                                                                    • C:\Windows\System32\rundll32.exe
                                                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                      1⤵
                                                                        PID:3816
                                                                      • C:\Users\Admin\Desktop\wfree_TnskQXC0.exe
                                                                        "C:\Users\Admin\Desktop\wfree_TnskQXC0.exe"
                                                                        1⤵
                                                                          PID:1708
                                                                          • C:\Users\Admin\AppData\Local\Temp\is-D5HVI.tmp\is-OAMOQ.tmp
                                                                            "C:\Users\Admin\AppData\Local\Temp\is-D5HVI.tmp\is-OAMOQ.tmp" /SL4 $C0118 "C:\Users\Admin\Desktop\wfree_TnskQXC0.exe" 5198354 52224
                                                                            2⤵
                                                                            • Executes dropped EXE
                                                                            • Loads dropped DLL
                                                                            • Drops file in Program Files directory
                                                                            PID:3668
                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                              "C:\Windows\system32\schtasks.exe" /Query
                                                                              3⤵
                                                                                PID:4668
                                                                              • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe
                                                                                "C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"
                                                                                3⤵
                                                                                • Executes dropped EXE
                                                                                PID:4272
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 924
                                                                                  4⤵
                                                                                  • Program crash
                                                                                  PID:4376
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 944
                                                                                  4⤵
                                                                                  • Program crash
                                                                                  PID:1420
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 140
                                                                                  4⤵
                                                                                  • Program crash
                                                                                  PID:628
                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                "C:\Windows\system32\schtasks.exe" /Delete /F /TN "CloneRemover 3.9"
                                                                                3⤵
                                                                                  PID:2300
                                                                                • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe
                                                                                  "C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe" e59af0b35d1b90bf89ab8ffd26774b16
                                                                                  3⤵
                                                                                  • Executes dropped EXE
                                                                                  • Checks for any installed AV software in registry
                                                                                  • Modifies registry class
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  PID:3708
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 908
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:1188
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 916
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:3064
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 928
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:3940
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1108
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:2736
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1128
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:5100
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1128
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:2064
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1120
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:4652
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1352
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:4388
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1360
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:1456
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1028
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:2040
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1012
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:2120
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1688
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:2852
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 936
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:2276
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1012
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:3996
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1832
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:2576
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1872
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:396
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1932
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:4828
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1392
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:4176
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1844
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:3544
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1488
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:1260
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1700
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:3980
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1988
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:4192
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1984
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:4608
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1940
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:2680
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 2060
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:4644
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1940
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:3896
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 2068
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:3472
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 2076
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:2604
                                                                                  • C:\Users\Admin\AppData\Local\Temp\AVxErQ7F\Re4Ja.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\AVxErQ7F\Re4Ja.exe /silentmix SUB=e59af0b35d1b90bf89ab8ffd26774b16
                                                                                    4⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:1240
                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-BB4CR.tmp\is-A10SR.tmp
                                                                                      "C:\Users\Admin\AppData\Local\Temp\is-BB4CR.tmp\is-A10SR.tmp" /SL4 $80376 "C:\Users\Admin\AppData\Local\Temp\AVxErQ7F\Re4Ja.exe" 804864 52736 /silentmix SUB=e59af0b35d1b90bf89ab8ffd26774b16
                                                                                      5⤵
                                                                                      • Executes dropped EXE
                                                                                      • Loads dropped DLL
                                                                                      • Drops file in Program Files directory
                                                                                      PID:4940
                                                                                      • C:\Program Files (x86)\Floppy Disk Master\fdm-11.exe
                                                                                        "C:\Program Files (x86)\Floppy Disk Master\fdm-11.exe" /silentmix SUB=e59af0b35d1b90bf89ab8ffd26774b16
                                                                                        6⤵
                                                                                        • Executes dropped EXE
                                                                                        • Checks computer location settings
                                                                                        PID:912
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /c taskkill /im "fdm-11.exe" /f & erase "C:\Program Files (x86)\Floppy Disk Master\fdm-11.exe" & exit
                                                                                          7⤵
                                                                                            PID:348
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /im "fdm-11.exe" /f
                                                                                              8⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:2056
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1688
                                                                                      4⤵
                                                                                      • Program crash
                                                                                      PID:4160
                                                                                    • C:\Users\Admin\AppData\Local\Temp\sbsRr8AU\sQvQaf34MA7w0qV.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\sbsRr8AU\sQvQaf34MA7w0qV.exe
                                                                                      4⤵
                                                                                      • Executes dropped EXE
                                                                                      PID:3620
                                                                                      • C:\Users\Admin\AppData\Local\Temp\is-6MEBS.tmp\is-V7SCO.tmp
                                                                                        "C:\Users\Admin\AppData\Local\Temp\is-6MEBS.tmp\is-V7SCO.tmp" /SL4 $503FE "C:\Users\Admin\AppData\Local\Temp\sbsRr8AU\sQvQaf34MA7w0qV.exe" 941720 52736
                                                                                        5⤵
                                                                                        • Executes dropped EXE
                                                                                        • Loads dropped DLL
                                                                                        • Drops file in Program Files directory
                                                                                        PID:2188
                                                                                        • C:\Program Files (x86)\Exfa A. Ronip\SMART_Assistant\SMARTAssistant.exe
                                                                                          "C:\Program Files (x86)\Exfa A. Ronip\SMART_Assistant\SMARTAssistant.exe"
                                                                                          6⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:4584
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 2132
                                                                                      4⤵
                                                                                      • Program crash
                                                                                      PID:2984
                                                                                    • C:\Users\Admin\AppData\Local\Temp\oWNX1ell\LbRm4UAB5bMXn3mhSfu.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\oWNX1ell\LbRm4UAB5bMXn3mhSfu.exe /S /site_id=757674
                                                                                      4⤵
                                                                                      • Executes dropped EXE
                                                                                      PID:388
                                                                                      • C:\Users\Admin\AppData\Local\Temp\7zSEAE8.tmp\Install.exe
                                                                                        .\Install.exe /S /site_id=757674
                                                                                        5⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:4708
                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zSEF1E.tmp\Install.exe
                                                                                          .\Install.exe /S /site_id "757674" /S /site_id=757674
                                                                                          6⤵
                                                                                          • Executes dropped EXE
                                                                                          • Checks BIOS information in registry
                                                                                          • Checks computer location settings
                                                                                          • Drops file in System32 directory
                                                                                          • Enumerates system info in registry
                                                                                          PID:3656
                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                            "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
                                                                                            7⤵
                                                                                              PID:4396
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                                                                                                8⤵
                                                                                                  PID:4192
                                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                                                                                                    9⤵
                                                                                                      PID:4540
                                                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                                                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                                                                                                      9⤵
                                                                                                        PID:4588
                                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                                    "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
                                                                                                    7⤵
                                                                                                      PID:4064
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
                                                                                                        8⤵
                                                                                                          PID:5036
                                                                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                                                                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
                                                                                                            9⤵
                                                                                                              PID:3456
                                                                                                            • \??\c:\windows\SysWOW64\reg.exe
                                                                                                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                                                                                                              9⤵
                                                                                                                PID:4608
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /CREATE /TN "gGtILHFBb" /SC once /ST 14:34:33 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                            7⤵
                                                                                                            • Creates scheduled task(s)
                                                                                                            PID:3180
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /run /I /tn "gGtILHFBb"
                                                                                                            7⤵
                                                                                                              PID:2132
                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                              schtasks /DELETE /F /TN "gGtILHFBb"
                                                                                                              7⤵
                                                                                                                PID:4588
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /CREATE /TN "bQVIyCuucUjqxTYLAY" /SC once /ST 18:20:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\jeUhSkFkkIbgydTZa\xiEkNlOfzcWZMyi\blDVxCK.exe\" 3T /site_id 757674 /S" /V1 /F
                                                                                                                7⤵
                                                                                                                • Drops file in Windows directory
                                                                                                                • Creates scheduled task(s)
                                                                                                                PID:1700
                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1932
                                                                                                          4⤵
                                                                                                          • Program crash
                                                                                                          PID:636
                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 2052
                                                                                                          4⤵
                                                                                                          • Program crash
                                                                                                          PID:436
                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 2172
                                                                                                          4⤵
                                                                                                          • Program crash
                                                                                                          PID:3932
                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            5⤵
                                                                                                              PID:4192
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1488
                                                                                                            4⤵
                                                                                                            • Program crash
                                                                                                            PID:1120
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 2176
                                                                                                            4⤵
                                                                                                            • Program crash
                                                                                                            PID:1256
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 2192
                                                                                                            4⤵
                                                                                                            • Program crash
                                                                                                            PID:1184
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 2100
                                                                                                            4⤵
                                                                                                            • Program crash
                                                                                                            PID:3972
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 2192
                                                                                                            4⤵
                                                                                                            • Program crash
                                                                                                            PID:1420
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1536
                                                                                                            4⤵
                                                                                                            • Program crash
                                                                                                            PID:4372
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1396
                                                                                                            4⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Loads dropped DLL
                                                                                                            • Drops file in Program Files directory
                                                                                                            • Program crash
                                                                                                            PID:4500
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 2156
                                                                                                            4⤵
                                                                                                            • Program crash
                                                                                                            PID:4368
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1816
                                                                                                            4⤵
                                                                                                            • Program crash
                                                                                                            PID:4304
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 140
                                                                                                            4⤵
                                                                                                            • Drops file in Windows directory
                                                                                                            • Program crash
                                                                                                            PID:2248
                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4272 -ip 4272
                                                                                                      1⤵
                                                                                                        PID:2356
                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4272 -ip 4272
                                                                                                        1⤵
                                                                                                          PID:668
                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4272 -ip 4272
                                                                                                          1⤵
                                                                                                            PID:2576
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3708 -ip 3708
                                                                                                            1⤵
                                                                                                              PID:1260
                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3708 -ip 3708
                                                                                                              1⤵
                                                                                                                PID:3364
                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3708 -ip 3708
                                                                                                                1⤵
                                                                                                                  PID:4612
                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3708 -ip 3708
                                                                                                                  1⤵
                                                                                                                    PID:1804
                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3708 -ip 3708
                                                                                                                    1⤵
                                                                                                                      PID:3248
                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3708 -ip 3708
                                                                                                                      1⤵
                                                                                                                        PID:2180
                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3708 -ip 3708
                                                                                                                        1⤵
                                                                                                                          PID:4552
                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3708 -ip 3708
                                                                                                                          1⤵
                                                                                                                            PID:3392
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RFoKlzoQU" /t REG_DWORD /d 0 /reg:32
                                                                                                                              2⤵
                                                                                                                                PID:2488
                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3708 -ip 3708
                                                                                                                              1⤵
                                                                                                                                PID:2628
                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3708 -ip 3708
                                                                                                                                1⤵
                                                                                                                                  PID:912
                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3708 -ip 3708
                                                                                                                                  1⤵
                                                                                                                                    PID:1580
                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3708 -ip 3708
                                                                                                                                    1⤵
                                                                                                                                      PID:2132
                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3708 -ip 3708
                                                                                                                                      1⤵
                                                                                                                                        PID:2188
                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3708 -ip 3708
                                                                                                                                        1⤵
                                                                                                                                          PID:3680
                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3708 -ip 3708
                                                                                                                                          1⤵
                                                                                                                                            PID:2944
                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 3708 -ip 3708
                                                                                                                                            1⤵
                                                                                                                                              PID:3552
                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 3708 -ip 3708
                                                                                                                                              1⤵
                                                                                                                                                PID:800
                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 3708 -ip 3708
                                                                                                                                                1⤵
                                                                                                                                                  PID:4864
                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 3708 -ip 3708
                                                                                                                                                  1⤵
                                                                                                                                                    PID:3216
                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 3708 -ip 3708
                                                                                                                                                    1⤵
                                                                                                                                                      PID:3304
                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3708 -ip 3708
                                                                                                                                                      1⤵
                                                                                                                                                        PID:1668
                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 3708 -ip 3708
                                                                                                                                                        1⤵
                                                                                                                                                          PID:2380
                                                                                                                                                        • C:\Users\Admin\Documents\w1free.rar_id20808547.exe
                                                                                                                                                          "C:\Users\Admin\Documents\w1free.rar_id20808547.exe"
                                                                                                                                                          1⤵
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          • Writes to the Master Boot Record (MBR)
                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                          PID:1404
                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 3708 -ip 3708
                                                                                                                                                          1⤵
                                                                                                                                                            PID:2868
                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 3708 -ip 3708
                                                                                                                                                            1⤵
                                                                                                                                                              PID:4268
                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 3708 -ip 3708
                                                                                                                                                              1⤵
                                                                                                                                                                PID:5088
                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 3708 -ip 3708
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:2296
                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 3708 -ip 3708
                                                                                                                                                                  1⤵
                                                                                                                                                                    PID:3464
                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 3708 -ip 3708
                                                                                                                                                                    1⤵
                                                                                                                                                                      PID:3408
                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 3708 -ip 3708
                                                                                                                                                                      1⤵
                                                                                                                                                                        PID:1184
                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 3708 -ip 3708
                                                                                                                                                                        1⤵
                                                                                                                                                                          PID:1096
                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 3708 -ip 3708
                                                                                                                                                                          1⤵
                                                                                                                                                                            PID:4624
                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 740 -p 3708 -ip 3708
                                                                                                                                                                            1⤵
                                                                                                                                                                              PID:3484
                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 3708 -ip 3708
                                                                                                                                                                              1⤵
                                                                                                                                                                                PID:4256
                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 764 -p 3708 -ip 3708
                                                                                                                                                                                1⤵
                                                                                                                                                                                  PID:5088
                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 780 -p 3708 -ip 3708
                                                                                                                                                                                  1⤵
                                                                                                                                                                                    PID:2112
                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 808 -p 3708 -ip 3708
                                                                                                                                                                                    1⤵
                                                                                                                                                                                      PID:2604
                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 796 -p 3708 -ip 3708
                                                                                                                                                                                      1⤵
                                                                                                                                                                                        PID:2616
                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 812 -p 3708 -ip 3708
                                                                                                                                                                                        1⤵
                                                                                                                                                                                          PID:2104
                                                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                                                                                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                                                                                          1⤵
                                                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                          PID:3680
                                                                                                                                                                                          • C:\Windows\system32\gpupdate.exe
                                                                                                                                                                                            "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:2500
                                                                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                                                                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                                                                                                                                            1⤵
                                                                                                                                                                                              PID:4764
                                                                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                                                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                                                                                              1⤵
                                                                                                                                                                                                PID:4864
                                                                                                                                                                                              • C:\Windows\system32\gpscript.exe
                                                                                                                                                                                                gpscript.exe /RefreshSystemParam
                                                                                                                                                                                                1⤵
                                                                                                                                                                                                  PID:2632
                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 800 -p 3708 -ip 3708
                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                    PID:4608
                                                                                                                                                                                                  • C:\Users\Admin\Desktop\wfree_TnskQXC0.exe
                                                                                                                                                                                                    "C:\Users\Admin\Desktop\wfree_TnskQXC0.exe"
                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                      PID:1996
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\is-J3T8V.tmp\is-TVUV0.tmp
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\is-J3T8V.tmp\is-TVUV0.tmp" /SL4 $302AC "C:\Users\Admin\Desktop\wfree_TnskQXC0.exe" 5198354 52224
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                        • Loads dropped DLL
                                                                                                                                                                                                        • Drops file in Program Files directory
                                                                                                                                                                                                        PID:2248
                                                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                          "C:\Windows\system32\schtasks.exe" /Query
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                            PID:1272
                                                                                                                                                                                                          • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe
                                                                                                                                                                                                            "C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                              PID:2848
                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 896
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                • Program crash
                                                                                                                                                                                                                PID:1620
                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 932
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                • Program crash
                                                                                                                                                                                                                PID:2916
                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 140
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                • Program crash
                                                                                                                                                                                                                PID:800
                                                                                                                                                                                                            • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe
                                                                                                                                                                                                              "C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe" e59af0b35d1b90bf89ab8ffd26774b16
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                PID:1504
                                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 140
                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                  • Program crash
                                                                                                                                                                                                                  PID:3476
                                                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                "C:\Windows\system32\schtasks.exe" /Delete /F /TN "CloneRemover 3.9"
                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                  PID:796
                                                                                                                                                                                                            • C:\Users\Admin\Desktop\wfree_TnskQXC0.exe
                                                                                                                                                                                                              "C:\Users\Admin\Desktop\wfree_TnskQXC0.exe"
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                PID:2296
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\is-U79RP.tmp\is-K4CPK.tmp
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\is-U79RP.tmp\is-K4CPK.tmp" /SL4 $403BE "C:\Users\Admin\Desktop\wfree_TnskQXC0.exe" 5198354 52224
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                                                                                  PID:4464
                                                                                                                                                                                                                  • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe
                                                                                                                                                                                                                    "C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                      PID:2208
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 704
                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                        • Program crash
                                                                                                                                                                                                                        PID:3616
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                      "C:\Windows\system32\schtasks.exe" /Query
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:4108
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                        "C:\Windows\system32\schtasks.exe" /Delete /F /TN "CloneRemover 3.9"
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:1452
                                                                                                                                                                                                                        • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe
                                                                                                                                                                                                                          "C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe" e59af0b35d1b90bf89ab8ffd26774b16
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          PID:3128
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3128 -s 140
                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                            • Program crash
                                                                                                                                                                                                                            PID:704
                                                                                                                                                                                                                    • C:\Users\Admin\Desktop\wfree_TnskQXC0.exe
                                                                                                                                                                                                                      "C:\Users\Admin\Desktop\wfree_TnskQXC0.exe"
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                        PID:2604
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\is-NL2I7.tmp\is-143NN.tmp
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\is-NL2I7.tmp\is-143NN.tmp" /SL4 $503C8 "C:\Users\Admin\Desktop\wfree_TnskQXC0.exe" 5198354 52224
                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Loads dropped DLL
                                                                                                                                                                                                                          • Drops file in Program Files directory
                                                                                                                                                                                                                          PID:4448
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                            "C:\Windows\system32\schtasks.exe" /Query
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                              PID:3384
                                                                                                                                                                                                                            • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe
                                                                                                                                                                                                                              "C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              PID:2912
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 832
                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                • Program crash
                                                                                                                                                                                                                                PID:1948
                                                                                                                                                                                                                            • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe
                                                                                                                                                                                                                              "C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe" e59af0b35d1b90bf89ab8ffd26774b16
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              PID:1184
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 1184 -s 144
                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                • Program crash
                                                                                                                                                                                                                                PID:3980
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                              "C:\Windows\system32\schtasks.exe" /Delete /F /TN "CloneRemover 3.9"
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                PID:4160
                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\wfree_TnskQXC0.exe
                                                                                                                                                                                                                            "C:\Users\Admin\Desktop\wfree_TnskQXC0.exe"
                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                              PID:1916
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-UHBC0.tmp\is-S03N0.tmp
                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\is-UHBC0.tmp\is-S03N0.tmp" /SL4 $403DA "C:\Users\Admin\Desktop\wfree_TnskQXC0.exe" 5198354 52224
                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                • Loads dropped DLL
                                                                                                                                                                                                                                • Drops file in Program Files directory
                                                                                                                                                                                                                                PID:2132
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                  "C:\Windows\system32\schtasks.exe" /Query
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                    PID:4800
                                                                                                                                                                                                                                  • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe
                                                                                                                                                                                                                                    "C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                      PID:4928
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 832
                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                        • Program crash
                                                                                                                                                                                                                                        PID:4868
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                      "C:\Windows\system32\schtasks.exe" /Delete /F /TN "CloneRemover 3.9"
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                        PID:3436
                                                                                                                                                                                                                                      • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe
                                                                                                                                                                                                                                        "C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe" e59af0b35d1b90bf89ab8ffd26774b16
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                        PID:2984
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 140
                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                          • Program crash
                                                                                                                                                                                                                                          PID:668
                                                                                                                                                                                                                                  • C:\Users\Admin\Desktop\wfree_TnskQXC0.exe
                                                                                                                                                                                                                                    "C:\Users\Admin\Desktop\wfree_TnskQXC0.exe"
                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                      PID:728
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\is-QEFR1.tmp\is-IA8BR.tmp
                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\is-QEFR1.tmp\is-IA8BR.tmp" /SL4 $303EC "C:\Users\Admin\Desktop\wfree_TnskQXC0.exe" 5198354 52224
                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                          PID:4500
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                            "C:\Windows\system32\schtasks.exe" /Query
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                              PID:2352
                                                                                                                                                                                                                                            • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe
                                                                                                                                                                                                                                              "C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                              PID:4920
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                              "C:\Windows\system32\schtasks.exe" /Delete /F /TN "CloneRemover 3.9"
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:4432
                                                                                                                                                                                                                                              • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe
                                                                                                                                                                                                                                                "C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe" e59af0b35d1b90bf89ab8ffd26774b16
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                PID:4104
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 140
                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                  • Program crash
                                                                                                                                                                                                                                                  PID:2036
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 824 -p 2848 -ip 2848
                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                              PID:3520
                                                                                                                                                                                                                                            • C:\Users\Admin\Desktop\wfree_TnskQXC0.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\Desktop\wfree_TnskQXC0.exe"
                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                PID:3940
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\is-J0CH8.tmp\is-MAV7K.tmp
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\is-J0CH8.tmp\is-MAV7K.tmp" /SL4 $2023C "C:\Users\Admin\Desktop\wfree_TnskQXC0.exe" 5198354 52224
                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                                                                                                                  • Drops file in Program Files directory
                                                                                                                                                                                                                                                  PID:1036
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                    "C:\Windows\system32\schtasks.exe" /Query
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                      PID:1264
                                                                                                                                                                                                                                                    • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe
                                                                                                                                                                                                                                                      "C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"
                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                      PID:3440
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                      "C:\Windows\system32\schtasks.exe" /Delete /F /TN "CloneRemover 3.9"
                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                        PID:3180
                                                                                                                                                                                                                                                      • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe
                                                                                                                                                                                                                                                        "C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe" e59af0b35d1b90bf89ab8ffd26774b16
                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                          PID:668
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 816 -p 2208 -ip 2208
                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                        PID:2120
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 868 -p 2912 -ip 2912
                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                          PID:5116
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 880 -p 2848 -ip 2848
                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                            PID:4588
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 884 -p 4928 -ip 4928
                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                              PID:2300
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 924 -p 4920 -ip 4920
                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                PID:3428
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 772 -p 3440 -ip 3440
                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                  PID:3100
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 788 -p 2848 -ip 2848
                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                    PID:1880
                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 796 -p 4104 -ip 4104
                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                      PID:2380
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 840 -p 668 -ip 668
                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                        PID:2300
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 792 -p 3128 -ip 3128
                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                          PID:1600
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 820 -p 1184 -ip 1184
                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                            PID:3464
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 848 -p 1504 -ip 1504
                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                              PID:3304
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 764 -p 2984 -ip 2984
                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                PID:1348
                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\jeUhSkFkkIbgydTZa\xiEkNlOfzcWZMyi\blDVxCK.exe
                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\jeUhSkFkkIbgydTZa\xiEkNlOfzcWZMyi\blDVxCK.exe 3T /site_id 757674 /S
                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                                                                                                PID:2868
                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                  powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"
                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                  • Blocklisted process makes network request
                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                                                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                  PID:2848
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                      PID:704
                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                        PID:3248
                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                          PID:3304
                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                            PID:4164
                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                              PID:1656
                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                PID:800
                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                  PID:928
                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                    PID:2616
                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                      PID:2620
                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                        PID:2576
                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                          PID:2296
                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                            PID:3616
                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                              PID:4740
                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                                PID:332
                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                  PID:212
                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                    PID:1508
                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                    PID:2208
                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                      PID:2056
                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                        PID:4140
                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                                        • Drops file in Program Files directory
                                                                                                                                                                                                                                                                                                                        PID:4464
                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                                          PID:3688
                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                            PID:1588
                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                                              PID:2380
                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                              "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                                                PID:3360
                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                              powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RFoKlzoQU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RFoKlzoQU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\SEHcMRqOySkqPjodpTR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\SEHcMRqOySkqPjodpTR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\aIsgkipqYqjkC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\aIsgkipqYqjkC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\iQQhDFQnTDUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\iQQhDFQnTDUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\jxVmDfoFnnvU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\jxVmDfoFnnvU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\MMuRMqsaIxxaqhVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\MMuRMqsaIxxaqhVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\jeUhSkFkkIbgydTZa\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\jeUhSkFkkIbgydTZa\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\ZuCHwPloRhxnZBJU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\ZuCHwPloRhxnZBJU\" /t REG_DWORD /d 0 /reg:64;"
                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                                              • Modifies data under HKEY_USERS
                                                                                                                                                                                                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                              PID:4356
                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SEHcMRqOySkqPjodpTR" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                                  PID:4848
                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\iQQhDFQnTDUn" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                                    PID:436
                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\jeUhSkFkkIbgydTZa /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                                      PID:4436
                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\jeUhSkFkkIbgydTZa /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                                        PID:4748
                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\ZuCHwPloRhxnZBJU /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                                                          PID:4264
                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\ZuCHwPloRhxnZBJU /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                            PID:1084
                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\MMuRMqsaIxxaqhVB /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                                                              PID:4460
                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\MMuRMqsaIxxaqhVB /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                                                                PID:880
                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jxVmDfoFnnvU2" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                                                  PID:4552
                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jxVmDfoFnnvU2" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                                                    PID:4128
                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\iQQhDFQnTDUn" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                                                      PID:344
                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aIsgkipqYqjkC" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                                                        PID:2628
                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aIsgkipqYqjkC" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                                                                          PID:1420
                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SEHcMRqOySkqPjodpTR" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                                            PID:4416
                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RFoKlzoQU" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                                                                              PID:208
                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                              "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RFoKlzoQU" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                                                                                PID:3392
                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                              schtasks /CREATE /TN "gLFNAOSpl" /SC once /ST 01:28:18 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                                              • Creates scheduled task(s)
                                                                                                                                                                                                                                                                                                                                                              PID:4192
                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                              schtasks /run /I /tn "gLFNAOSpl"
                                                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                                                PID:1992
                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                schtasks /DELETE /F /TN "gLFNAOSpl"
                                                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                                                • Drops file in Program Files directory
                                                                                                                                                                                                                                                                                                                                                                PID:4464
                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                schtasks /CREATE /TN "NCFohduUlgzsvLtPH" /SC once /ST 06:06:52 /RU "SYSTEM" /TR "\"C:\Windows\Temp\ZuCHwPloRhxnZBJU\hLSrlDewNYVbAhL\hFcIjsL.exe\" Ym /site_id 757674 /S" /V1 /F
                                                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                                                • Drops file in Windows directory
                                                                                                                                                                                                                                                                                                                                                                • Creates scheduled task(s)
                                                                                                                                                                                                                                                                                                                                                                PID:2620
                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                schtasks /run /I /tn "NCFohduUlgzsvLtPH"
                                                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                                                  PID:2056
                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                  PID:4540
                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                  PID:4316
                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\gpupdate.exe
                                                                                                                                                                                                                                                                                                                                                                    "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                                                      PID:3468
                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                                                                                                                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                      PID:4916
                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\gpscript.exe
                                                                                                                                                                                                                                                                                                                                                                      gpscript.exe /RefreshSystemParam
                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                        PID:1248
                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\Temp\ZuCHwPloRhxnZBJU\hLSrlDewNYVbAhL\hFcIjsL.exe
                                                                                                                                                                                                                                                                                                                                                                        C:\Windows\Temp\ZuCHwPloRhxnZBJU\hLSrlDewNYVbAhL\hFcIjsL.exe Ym /site_id 757674 /S
                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                                        • Checks computer location settings
                                                                                                                                                                                                                                                                                                                                                                        • Drops Chrome extension
                                                                                                                                                                                                                                                                                                                                                                        • Drops desktop.ini file(s)
                                                                                                                                                                                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                                                                                        • Drops file in Program Files directory
                                                                                                                                                                                                                                                                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                                                                                                                                                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                                                                                                                                        PID:212
                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                          schtasks /DELETE /F /TN "bQVIyCuucUjqxTYLAY"
                                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                                            PID:2980
                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                                                              PID:4784
                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                                                PID:4928
                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                                                                                  PID:1956
                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                                                                  PID:4304
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                                                                                    REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                                                                                      PID:348
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                    schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\RFoKlzoQU\YKszUH.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "xRzmvqrNLZCxpjs" /V1 /F
                                                                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                                                                                                                                                                                                    PID:2248
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                    schtasks /CREATE /TN "xRzmvqrNLZCxpjs2" /F /xml "C:\Program Files (x86)\RFoKlzoQU\uoGpjuR.xml" /RU "SYSTEM"
                                                                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                                                                                                                                                                                                    PID:4460
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                                                                                        PID:4800
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                      schtasks /END /TN "xRzmvqrNLZCxpjs"
                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                        PID:1084
                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                        schtasks /DELETE /F /TN "xRzmvqrNLZCxpjs"
                                                                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                                                                          PID:3476
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                          schtasks /CREATE /TN "YqkwsPLcwOcMRl" /F /xml "C:\Program Files (x86)\jxVmDfoFnnvU2\tpIdFJw.xml" /RU "SYSTEM"
                                                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                                                          • Creates scheduled task(s)
                                                                                                                                                                                                                                                                                                                                                                                          PID:1260
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                          schtasks /CREATE /TN "WhAZkLdrcjuNd2" /F /xml "C:\ProgramData\MMuRMqsaIxxaqhVB\YUBZfpq.xml" /RU "SYSTEM"
                                                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                                                          • Creates scheduled task(s)
                                                                                                                                                                                                                                                                                                                                                                                          PID:3932
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                          schtasks /CREATE /TN "gZYzeWKFNnfUJeihl2" /F /xml "C:\Program Files (x86)\SEHcMRqOySkqPjodpTR\OHeoLmD.xml" /RU "SYSTEM"
                                                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                                                          • Creates scheduled task(s)
                                                                                                                                                                                                                                                                                                                                                                                          PID:4064
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                          schtasks /CREATE /TN "bFKJkocbgypGFVdiaRF2" /F /xml "C:\Program Files (x86)\aIsgkipqYqjkC\aatkRny.xml" /RU "SYSTEM"
                                                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                                                          • Creates scheduled task(s)
                                                                                                                                                                                                                                                                                                                                                                                          PID:2916
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                          schtasks /CREATE /TN "dXlFeCIlfFsViObwD" /SC once /ST 02:59:57 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\ZuCHwPloRhxnZBJU\iODVfnIT\CvipdpC.dll\",#1 /site_id 757674" /V1 /F
                                                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                                                          • Drops file in Windows directory
                                                                                                                                                                                                                                                                                                                                                                                          • Creates scheduled task(s)
                                                                                                                                                                                                                                                                                                                                                                                          PID:4456
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                          schtasks /run /I /tn "dXlFeCIlfFsViObwD"
                                                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                                                            PID:1452
                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                                                                              PID:1104
                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                                                                                                  PID:2056
                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                                                                                                    PID:2520
                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                  cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                                                                                    PID:1524
                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                                                                                                      REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                                                                                                        PID:3228
                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                                      schtasks /DELETE /F /TN "NCFohduUlgzsvLtPH"
                                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                                        PID:216
                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                                                                      PID:1504
                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 756 -p 3708 -ip 3708
                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                        PID:2884
                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                                                                                                                                                                                                                                        C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\ZuCHwPloRhxnZBJU\iODVfnIT\CvipdpC.dll",#1 /site_id 757674
                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                        • Blocklisted process makes network request
                                                                                                                                                                                                                                                                                                                                                                                                        • Checks BIOS information in registry
                                                                                                                                                                                                                                                                                                                                                                                                        • Loads dropped DLL
                                                                                                                                                                                                                                                                                                                                                                                                        • Enumerates system info in registry
                                                                                                                                                                                                                                                                                                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                                                                                                                                                                                                                                                                                                        PID:3760
                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                                          schtasks /DELETE /F /TN "dXlFeCIlfFsViObwD"
                                                                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                                                                            PID:804
                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\rundll32.EXE
                                                                                                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\ZuCHwPloRhxnZBJU\iODVfnIT\CvipdpC.dll",#1 /site_id 757674
                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                            PID:1928
                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 912 -p 3708 -ip 3708
                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                              PID:2408
                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 912 -p 3708 -ip 3708
                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                PID:3896
                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 744 -p 3708 -ip 3708
                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                  PID:1956
                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\rundll32.EXE
                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\rundll32.EXE "C:\Program Files (x86)\SEHcMRqOySkqPjodpTR\HEpqrvT.dll",#1
                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                    PID:4240
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\rundll32.EXE "C:\Program Files (x86)\SEHcMRqOySkqPjodpTR\HEpqrvT.dll",#1
                                                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:4592

                                                                                                                                                                                                                                                                                                                                                                                                                  Network

                                                                                                                                                                                                                                                                                                                                                                                                                  MITRE ATT&CK Enterprise v6

                                                                                                                                                                                                                                                                                                                                                                                                                  Replay Monitor

                                                                                                                                                                                                                                                                                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                                                                                                                                  Downloads

                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Exfa A. Ronip\SMART_Assistant\SMARTAssistant.exe

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    2.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                    9d271a092a4064cb5614951b8f44d527

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                    3ff2035bcadbef9c7ec9140bc1929abfbc1fae40

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                    0edd1ca0d8900dc765b08b1a4dd0d7bcb043ebe71ae7ff1a01193ea1a6b62f6d

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                    c30dbda16c2f06bd549aabc30de8265a8ab7d331078ad3dfd82afb5fe8d7e94b9438cdfe68e487c0198ebdccc1a602c3e34292ddf3ecbba8751b18b9f6bb96ec

                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Exfa A. Ronip\SMART_Assistant\SMARTAssistant.exe

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    2.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                    9d271a092a4064cb5614951b8f44d527

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                    3ff2035bcadbef9c7ec9140bc1929abfbc1fae40

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                    0edd1ca0d8900dc765b08b1a4dd0d7bcb043ebe71ae7ff1a01193ea1a6b62f6d

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                    c30dbda16c2f06bd549aabc30de8265a8ab7d331078ad3dfd82afb5fe8d7e94b9438cdfe68e487c0198ebdccc1a602c3e34292ddf3ecbba8751b18b9f6bb96ec

                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Floppy Disk Master\fdm-11.exe

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                    7a2de809dbfef24125ca9b29935b6719

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                    98ac8fd8b2eef9401379cba1b0aae18135050689

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                    0152d68af35e8eed4bf2648de3dfe0965bf522829e3819229be160124b6cd836

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                    04d5d9f916532c9c11552bfa1b010f237e87ef53279ead204bf91e706d8e28d5d95a6f8453aa9e927617138177a411f4bb54a1a318d0aa0437c1e7f3b7710eb8

                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Floppy Disk Master\fdm-11.exe

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                    7a2de809dbfef24125ca9b29935b6719

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                    98ac8fd8b2eef9401379cba1b0aae18135050689

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                    0152d68af35e8eed4bf2648de3dfe0965bf522829e3819229be160124b6cd836

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                    04d5d9f916532c9c11552bfa1b010f237e87ef53279ead204bf91e706d8e28d5d95a6f8453aa9e927617138177a411f4bb54a1a318d0aa0437c1e7f3b7710eb8

                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    7.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                    4d510a1b278797c107efd0e73d8ac838

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                    00ab325238ac8944b1f5f98228dbdcabbdc650ba

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                    235201d18b44523483e72c4c246355159bc269b9d420324d7f936dd737c866b2

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                    26b435a842b8bde1804865af06ed5e7129ef169917f3ec76dd86d94b6ee668b09302e624d3817977aa229fb285efa8ef55bd8823a180f78cd41dc1332c740bd6

                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    7.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                    4d510a1b278797c107efd0e73d8ac838

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                    00ab325238ac8944b1f5f98228dbdcabbdc650ba

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                    235201d18b44523483e72c4c246355159bc269b9d420324d7f936dd737c866b2

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                    26b435a842b8bde1804865af06ed5e7129ef169917f3ec76dd86d94b6ee668b09302e624d3817977aa229fb285efa8ef55bd8823a180f78cd41dc1332c740bd6

                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    7.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                    4d510a1b278797c107efd0e73d8ac838

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                    00ab325238ac8944b1f5f98228dbdcabbdc650ba

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                    235201d18b44523483e72c4c246355159bc269b9d420324d7f936dd737c866b2

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                    26b435a842b8bde1804865af06ed5e7129ef169917f3ec76dd86d94b6ee668b09302e624d3817977aa229fb285efa8ef55bd8823a180f78cd41dc1332c740bd6

                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSEAE8.tmp\Install.exe

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    6.3MB

                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                    3b16d013d257edb060ab443eb3f4847c

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                    6d9b3811bb0f771f9d077a19b12c32b8f1d74fe6

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                    1a8ffcbd82bde3ad9cfb3a8d0cf1ee8e770cd91b9625a5e9a3fc1ef2093d7a61

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                    8a0e9b16ecc7d3b830140fdde4e3a23d201b9a626dcfa4a76396db48a8ac1af21e45346ecabbd3bd403c9665b2b62027c2a89ec00e5cbc7a4c3f7666c7008b04

                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSEAE8.tmp\Install.exe

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    6.3MB

                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                    3b16d013d257edb060ab443eb3f4847c

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                    6d9b3811bb0f771f9d077a19b12c32b8f1d74fe6

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                    1a8ffcbd82bde3ad9cfb3a8d0cf1ee8e770cd91b9625a5e9a3fc1ef2093d7a61

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                    8a0e9b16ecc7d3b830140fdde4e3a23d201b9a626dcfa4a76396db48a8ac1af21e45346ecabbd3bd403c9665b2b62027c2a89ec00e5cbc7a4c3f7666c7008b04

                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\AVxErQ7F\Re4Ja.exe

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    1017KB

                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                    7209f3e4c2cf20fe84d88f83ab0a355a

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                    f5d35e2f96c0eaeb4b02b0c1cd045f1b70be73a3

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                    12d0cea3d54df535b4f7bcc1834d758d6c86703dd6b9cba7daa019dd5eb33a02

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                    f5b56fcccdb2dca82a6a5e4e5cb63c728f06b20e6c8fdcfcb61cca586460affb9c2fbc118d0aa7e222df088f237e94177f2b4e50dae834a7f7e694a03359393e

                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\AVxErQ7F\Re4Ja.exe

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    1017KB

                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                    7209f3e4c2cf20fe84d88f83ab0a355a

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                    f5d35e2f96c0eaeb4b02b0c1cd045f1b70be73a3

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                    12d0cea3d54df535b4f7bcc1834d758d6c86703dd6b9cba7daa019dd5eb33a02

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                    f5b56fcccdb2dca82a6a5e4e5cb63c728f06b20e6c8fdcfcb61cca586460affb9c2fbc118d0aa7e222df088f237e94177f2b4e50dae834a7f7e694a03359393e

                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\is-6MEBS.tmp\is-V7SCO.tmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    658KB

                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                    fec7bff4c36a4303ade51e3ed704e708

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                    487c0f4af67e56a661b9f1d99515ff080db968c3

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                    0414eeff52f63cb32e508fe22c54aedb399e7a6baaab94a81081073dbe78c75f

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                    1267a0b954f3315b067883ff6ae8d599166ccfe35f1c7770e29f5f66a13650d4e1ae7f04c0b48e3da0875fb6c7127892f4a6ecd6214f43f6beb5013f55fe94d0

                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\is-6MEBS.tmp\is-V7SCO.tmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    658KB

                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                    fec7bff4c36a4303ade51e3ed704e708

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                    487c0f4af67e56a661b9f1d99515ff080db968c3

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                    0414eeff52f63cb32e508fe22c54aedb399e7a6baaab94a81081073dbe78c75f

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                    1267a0b954f3315b067883ff6ae8d599166ccfe35f1c7770e29f5f66a13650d4e1ae7f04c0b48e3da0875fb6c7127892f4a6ecd6214f43f6beb5013f55fe94d0

                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\is-7AUE5.tmp\_iscrypt.dll

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    2KB

                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                    a69559718ab506675e907fe49deb71e9

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                    bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                    2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                    e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\is-BB4CR.tmp\is-A10SR.tmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    658KB

                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                    fec7bff4c36a4303ade51e3ed704e708

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                    487c0f4af67e56a661b9f1d99515ff080db968c3

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                    0414eeff52f63cb32e508fe22c54aedb399e7a6baaab94a81081073dbe78c75f

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                    1267a0b954f3315b067883ff6ae8d599166ccfe35f1c7770e29f5f66a13650d4e1ae7f04c0b48e3da0875fb6c7127892f4a6ecd6214f43f6beb5013f55fe94d0

                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\is-BB4CR.tmp\is-A10SR.tmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    658KB

                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                    fec7bff4c36a4303ade51e3ed704e708

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                    487c0f4af67e56a661b9f1d99515ff080db968c3

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                    0414eeff52f63cb32e508fe22c54aedb399e7a6baaab94a81081073dbe78c75f

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                    1267a0b954f3315b067883ff6ae8d599166ccfe35f1c7770e29f5f66a13650d4e1ae7f04c0b48e3da0875fb6c7127892f4a6ecd6214f43f6beb5013f55fe94d0

                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\is-D5HVI.tmp\is-OAMOQ.tmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    644KB

                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                    94eb1579bb40fcb1eeed51fa3bfcfdc9

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                    88a3a731663a44e999594e5e7d5f85b03106bc73

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                    4be85ce355dcfbfa1f60226f6a57a37d9a52855ffffbce74820f13304c7bca5b

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                    4c82c7a87bb5f01117cafed866afc57866c436925346af1d427bfc657b7065698979cc02969a7f5af6b8bbf8560973c71fc27717a846e0d0fc17cd0a7c269e3a

                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\is-D5HVI.tmp\is-OAMOQ.tmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    644KB

                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                    94eb1579bb40fcb1eeed51fa3bfcfdc9

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                    88a3a731663a44e999594e5e7d5f85b03106bc73

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                    4be85ce355dcfbfa1f60226f6a57a37d9a52855ffffbce74820f13304c7bca5b

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                    4c82c7a87bb5f01117cafed866afc57866c436925346af1d427bfc657b7065698979cc02969a7f5af6b8bbf8560973c71fc27717a846e0d0fc17cd0a7c269e3a

                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\is-DMVDM.tmp\_isetup\_iscrypt.dll

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    2KB

                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                    a69559718ab506675e907fe49deb71e9

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                    bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                    2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                    e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\is-O20O1.tmp\_isetup\_iscrypt.dll

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    2KB

                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                    a69559718ab506675e907fe49deb71e9

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                    bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                    2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                    e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\oWNX1ell\LbRm4UAB5bMXn3mhSfu.exe

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    7.3MB

                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                    9eb1be6559ed1bf05d591781af30995f

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                    2ecc9139bea2c0d9aaa1d5faffb560b247bd0cef

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                    f4f87d4c7a715fc34257e482bbff4d46006c694e5b9832f7841233060e41ff78

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                    819cef8146fee37ae0a5d5f1a1abc0675d2479ff987a9be23e65e97c940f441f4f8f9be9bbef1f2fa9e52525fbb8818301c96943fa97e23e4b9129a891fccefd

                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\oWNX1ell\LbRm4UAB5bMXn3mhSfu.exe

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    7.3MB

                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                    9eb1be6559ed1bf05d591781af30995f

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                    2ecc9139bea2c0d9aaa1d5faffb560b247bd0cef

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                    f4f87d4c7a715fc34257e482bbff4d46006c694e5b9832f7841233060e41ff78

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                    819cef8146fee37ae0a5d5f1a1abc0675d2479ff987a9be23e65e97c940f441f4f8f9be9bbef1f2fa9e52525fbb8818301c96943fa97e23e4b9129a891fccefd

                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\sbsRr8AU\sQvQaf34MA7w0qV.exe

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                    bb6563acf5b3d1d8146dffc4160174ad

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                    0b4c440636723795f288a9a6ca2220bd97e44134

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                    2466b7107965ec93b472166a4312d7e49639a5d36c177845c5fc451ccbe5e4a4

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                    a18b6d3e5f3289fa56d4d28f4bd6c989ebc775e285624735291128b56ec94028af9364b96e7c9fbd04381ee45a41c05c2a38e8ac04b56c6afbfbeb11a35d0c87

                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\sbsRr8AU\sQvQaf34MA7w0qV.exe

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                    bb6563acf5b3d1d8146dffc4160174ad

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                    0b4c440636723795f288a9a6ca2220bd97e44134

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                    2466b7107965ec93b472166a4312d7e49639a5d36c177845c5fc451ccbe5e4a4

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                    a18b6d3e5f3289fa56d4d28f4bd6c989ebc775e285624735291128b56ec94028af9364b96e7c9fbd04381ee45a41c05c2a38e8ac04b56c6afbfbeb11a35d0c87

                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\Documents\w1free.rar_id20808547.exe

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    1.3MB

                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                    927988d3f2b9fa5f1e3c9589efff7a7b

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                    29f1bd8a327ab5369d2c912bfe3fb4399778b379

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                    c31da27d478a3654f7079c6134159eac961211c61c56e43cd3f0dafb6c4c3931

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                    f2c2f0c9e72a2372deb68bedf2744b461e1d5e6a620c38b6228ec87aac4f10ef07605c1a5ee7bd8507a94459db0d15073db15db907b541787386fa2305c6ace6

                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\Documents\w1free.rar_id20808547.exe

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    1.3MB

                                                                                                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                                                                                                    927988d3f2b9fa5f1e3c9589efff7a7b

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                    29f1bd8a327ab5369d2c912bfe3fb4399778b379

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                    c31da27d478a3654f7079c6134159eac961211c61c56e43cd3f0dafb6c4c3931

                                                                                                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                    f2c2f0c9e72a2372deb68bedf2744b461e1d5e6a620c38b6228ec87aac4f10ef07605c1a5ee7bd8507a94459db0d15073db15db907b541787386fa2305c6ace6

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/212-328-0x0000000004290000-0x00000000042F1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    388KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/212-331-0x0000000004C00000-0x0000000004C76000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    472KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/212-334-0x0000000005330000-0x00000000053EA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    744KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/212-324-0x0000000003B40000-0x0000000003BC5000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    532KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/348-212-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/388-174-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/668-276-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/668-281-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    21.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/728-293-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/728-244-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/728-265-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/796-284-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/912-184-0x0000000000400000-0x000000000130D000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    15.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/912-171-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/912-176-0x0000000000400000-0x000000000130D000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    15.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/912-214-0x0000000000400000-0x000000000130D000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    15.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1036-252-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1184-298-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    21.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1184-288-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1240-215-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1240-162-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1240-182-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1240-165-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1264-263-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1272-232-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1404-161-0x0000000000C90000-0x0000000000C93000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    12KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1404-218-0x0000000000C90000-0x0000000000C93000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    12KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1404-160-0x0000000000360000-0x00000000007EB000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    4.5MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1404-320-0x0000000000360000-0x00000000007EB000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    4.5MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1452-278-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1504-299-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    21.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1504-286-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1588-316-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1700-223-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1708-341-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1708-155-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1708-136-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1708-134-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1916-302-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1916-257-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1916-239-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1996-301-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1996-234-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/1996-224-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2056-213-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2132-242-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2132-217-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2188-185-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2208-262-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    21.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2208-243-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2248-226-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2296-296-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2296-236-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2296-227-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2300-149-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2352-258-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2380-315-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2500-220-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2604-230-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2604-300-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2604-238-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2848-308-0x0000000003E40000-0x0000000004468000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    6.2MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2848-306-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2848-311-0x00000000045B0000-0x0000000004616000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    408KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2848-233-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2848-310-0x0000000004540000-0x00000000045A6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    408KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2848-255-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    21.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2848-309-0x00000000044A0000-0x00000000044C2000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    136KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2848-282-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    21.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2848-312-0x0000000004C20000-0x0000000004C3E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    120KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2848-307-0x0000000001300000-0x0000000001336000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    216KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2868-303-0x0000000010000000-0x00000000109E4000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    9.9MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2912-268-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    21.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2912-251-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2984-297-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    21.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/2984-291-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3128-279-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3128-295-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    21.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3128-319-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    21.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3180-216-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3180-275-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3360-313-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3384-250-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3436-289-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3440-264-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3440-318-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    21.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3440-273-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    21.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3456-208-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3620-186-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3620-175-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3620-202-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3620-181-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3656-199-0x0000000010000000-0x00000000109E4000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    9.9MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3656-197-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3668-137-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3680-219-0x000002E1E44D0000-0x000002E1E44F2000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    136KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3680-221-0x00007FF832BF0000-0x00007FF8336B1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3708-150-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3708-154-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    21.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3708-156-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    21.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3708-153-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    21.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3708-340-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    21.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3708-157-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    21.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3760-337-0x0000000001B40000-0x0000000002524000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    9.9MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3940-267-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3940-248-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/3940-285-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4064-204-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4104-283-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    21.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4104-272-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4108-241-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4160-287-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4192-207-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4272-145-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    21.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4272-142-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4272-147-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    21.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4272-146-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    21.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4272-148-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    21.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4316-317-0x00007FF832BF0000-0x00007FF8336B1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4396-205-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4432-270-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4448-235-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4464-229-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4500-247-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4540-210-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4540-314-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4584-198-0x0000000000400000-0x0000000001237000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    14.2MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4584-200-0x0000000000400000-0x0000000001237000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    14.2MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4584-193-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4584-196-0x0000000000400000-0x0000000001237000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    14.2MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4588-222-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4588-211-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4592-342-0x00000000017C0000-0x00000000021A4000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    9.9MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4608-209-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4668-141-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4708-190-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4800-254-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4920-259-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4920-269-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    21.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4928-271-0x0000000000400000-0x00000000018FE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                    21.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4928-256-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/4940-167-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                  • memory/5036-206-0x0000000000000000-mapping.dmp